Crime Toolkits: The Productisation of Cybercrime

被引:9
作者
Alazab, Ammar [1 ]
Abawajy, Jemal [1 ]
Hobbs, Michael [1 ]
Layton, Robert [2 ]
Khraisat, Ansam [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Parallel & Distributed Comp Lab, Geelong, Vic 3217, Australia
[2] Univ Ballarat, Sch Informat Technol, Ballarat, Vic 3353, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
cybercrime; attack; styling; crime toolkits Introduction;
D O I
10.1109/TrustCom.2013.273
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
the productisation of crime toolkits is happening at an ever-increasing rate. Previous attacks that required in-depth knowledge of computer systems can now be purchased online. Large scale attacks previously requiring months to setup a botnet can now be scheduled for a small fee. Criminals are leveraging this opportunity of commercialization, by compromising web applications and user's browser, to gain advantages such as using the computer's resources for launching further attacks, or stealing data such as identifying information. Crime toolkits are being developed to attack an increasing number of applications and can now be deployed by attackers with little technical knowledge. This paper surveys the current trends in crime toolkits, with a case study on the Zeus botnet. We profile the types of exploits that malicious writers prefer, with a view to predicting future attack trends. We find that the scope for damage is increasing, particularly as specialisation and scale increase in cybercrime.
引用
收藏
页码:1626 / 1632
页数:7
相关论文
共 18 条
  • [1] Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
  • [2] Alazab A., 2012, ICITA 2011, P1
  • [3] Alazab A., 2013, SOCIAL NETWORK ENG S, P248
  • [4] Alazab M., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P52, DOI 10.1109/CTC.2010.8
  • [5] Alazab M., 2011, 7 INT C GLOB SEC SAF
  • [6] Alazab M., 2012, GLOBAL SECURITY, P204
  • [7] Barth A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P75
  • [8] On the Analysis of the Zeus Botnet Crimeware Toolkit
    Binsalleeh, H.
    Ormerod, T.
    Boukhtouta, A.
    Sinha, P.
    Youssef, A.
    Debbabi, M.
    Wang, L.
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 31 - 38
  • [9] Caldwell Tracey, 2011, Network Security, V2011, P10, DOI 10.1016/S1353-4858(11)70075-7
  • [10] Corporation T.M, 2010, COMMON VULNERABILITI