@inproceedings{fce62b52e0bf4b1faad1fdbdd0a2f5f6,
title = "Product offerings in malicious hacker markets",
abstract = "Marketplaces specializing in malicious hacking products-including malware and exploits-have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study presents how we effectively employed unsupervised techniques to this data as well as the types of insights we gained on various categories of malicious hacking products.",
author = "Ericsson Marin and Ahmad Diab and Paulo Shakarian",
note = "Publisher Copyright: {\textcopyright} 2016 IEEE.; 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 ; Conference date: 28-09-2016 Through 30-09-2016",
year = "2016",
month = nov,
day = "15",
doi = "10.1109/ISI.2016.7745465",
language = "English (US)",
series = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "187--189",
editor = "Wenji Mao and Wang, {G. Alan} and Lina Zhou and Lisa Kaati",
booktitle = "IEEE International Conference on Intelligence and Security Informatics",
}