32 Scopus citations

Abstract

Marketplaces specializing in malicious hacking products-including malware and exploits-have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study presents how we effectively employed unsupervised techniques to this data as well as the types of insights we gained on various categories of malicious hacking products.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationCybersecurity and Big Data, ISI 2016
EditorsWenji Mao, G. Alan Wang, Lina Zhou, Lisa Kaati
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages187-189
Number of pages3
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Publication series

NameIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
Country/TerritoryUnited States
CityTucson
Period9/28/169/30/16

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Product offerings in malicious hacker markets'. Together they form a unique fingerprint.

Cite this