Exploring threats and vulnerabilities in hacker web

Forums, IRC and carding shops

Victor Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Citations (Scopus)

Abstract

Cybersecurity is a problem of growing relevance that impacts all facets of society. As a result, many researchers have become interested in studying cybercriminals and online hacker communities in order to develop more effective cyber defenses. In particular, analysis of hacker community contents may reveal existing and emerging threats that pose great risk to individuals, businesses, and government. Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops. To identify threats, we couple machine learning methodology with information retrieval techniques. Our approach allows us to distill potential threats from the entirety of collected hacker contents. We present several examples of identified threats found through our analysis techniques. Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.

Original languageEnglish (US)
Title of host publication2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages85-90
Number of pages6
ISBN (Electronic)9781479998883
DOIs
StatePublished - Jul 23 2015
Event13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Baltimore, United States
Duration: May 27 2015May 29 2015

Other

Other13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
CountryUnited States
CityBaltimore
Period5/27/155/29/15

Fingerprint

hacker
Information retrieval
Learning systems
vulnerability
threat
Industry
community
methodology
information retrieval
learning
evidence

Keywords

  • Carding shops
  • Cyber security
  • Hacker forums
  • Hacker IRC
  • Threats
  • Vulnerabilities

ASJC Scopus subject areas

  • Artificial Intelligence
  • Law
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Benjamin, V., Li, W., Holt, T., & Chen, H. (2015). Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. In 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015 (pp. 85-90). [7165944] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISI.2015.7165944

Exploring threats and vulnerabilities in hacker web : Forums, IRC and carding shops. / Benjamin, Victor; Li, Weifeng; Holt, Thomas; Chen, Hsinchun.

2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., 2015. p. 85-90 7165944.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benjamin, V, Li, W, Holt, T & Chen, H 2015, Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. in 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015., 7165944, Institute of Electrical and Electronics Engineers Inc., pp. 85-90, 13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, United States, 5/27/15. https://doi.org/10.1109/ISI.2015.7165944
Benjamin V, Li W, Holt T, Chen H. Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. In 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc. 2015. p. 85-90. 7165944 https://doi.org/10.1109/ISI.2015.7165944
Benjamin, Victor ; Li, Weifeng ; Holt, Thomas ; Chen, Hsinchun. / Exploring threats and vulnerabilities in hacker web : Forums, IRC and carding shops. 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 85-90
@inproceedings{404e7f95dd244ed1836664f62bb3860c,
title = "Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops",
abstract = "Cybersecurity is a problem of growing relevance that impacts all facets of society. As a result, many researchers have become interested in studying cybercriminals and online hacker communities in order to develop more effective cyber defenses. In particular, analysis of hacker community contents may reveal existing and emerging threats that pose great risk to individuals, businesses, and government. Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops. To identify threats, we couple machine learning methodology with information retrieval techniques. Our approach allows us to distill potential threats from the entirety of collected hacker contents. We present several examples of identified threats found through our analysis techniques. Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.",
keywords = "Carding shops, Cyber security, Hacker forums, Hacker IRC, Threats, Vulnerabilities",
author = "Victor Benjamin and Weifeng Li and Thomas Holt and Hsinchun Chen",
year = "2015",
month = "7",
day = "23",
doi = "10.1109/ISI.2015.7165944",
language = "English (US)",
pages = "85--90",
booktitle = "2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Exploring threats and vulnerabilities in hacker web

T2 - Forums, IRC and carding shops

AU - Benjamin, Victor

AU - Li, Weifeng

AU - Holt, Thomas

AU - Chen, Hsinchun

PY - 2015/7/23

Y1 - 2015/7/23

N2 - Cybersecurity is a problem of growing relevance that impacts all facets of society. As a result, many researchers have become interested in studying cybercriminals and online hacker communities in order to develop more effective cyber defenses. In particular, analysis of hacker community contents may reveal existing and emerging threats that pose great risk to individuals, businesses, and government. Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops. To identify threats, we couple machine learning methodology with information retrieval techniques. Our approach allows us to distill potential threats from the entirety of collected hacker contents. We present several examples of identified threats found through our analysis techniques. Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.

AB - Cybersecurity is a problem of growing relevance that impacts all facets of society. As a result, many researchers have become interested in studying cybercriminals and online hacker communities in order to develop more effective cyber defenses. In particular, analysis of hacker community contents may reveal existing and emerging threats that pose great risk to individuals, businesses, and government. Thus, we are interested in developing an automated methodology for identifying tangible and verifiable evidence of potential threats within hacker forums, IRC channels, and carding shops. To identify threats, we couple machine learning methodology with information retrieval techniques. Our approach allows us to distill potential threats from the entirety of collected hacker contents. We present several examples of identified threats found through our analysis techniques. Results suggest that hacker communities can be analyzed to aid in cyber threat detection, thus providing promising direction for future work.

KW - Carding shops

KW - Cyber security

KW - Hacker forums

KW - Hacker IRC

KW - Threats

KW - Vulnerabilities

UR - http://www.scopus.com/inward/record.url?scp=84963755639&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84963755639&partnerID=8YFLogxK

U2 - 10.1109/ISI.2015.7165944

DO - 10.1109/ISI.2015.7165944

M3 - Conference contribution

SP - 85

EP - 90

BT - 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -