Product offerings in malicious hacker markets

Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study presents how we effectively employed unsupervised techniques to this data as well as the types of insights we gained on various categories of malicious hacking products.

[1]  Hsinchun Chen,et al.  Dark Web: Exploring and Mining the Dark Side of the Web , 2012, 2011 European Intelligence and Security Informatics Conference.

[2]  Paulo Shakarian,et al.  Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks , 2015, ArXiv.

[3]  Christopher C. Yang,et al.  Identifying Dark Web clusters with temporal coherence analysis , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[4]  Paulo Shakarian,et al.  Data Driven Game Theoretic Cyber Threat Mitigation , 2016, AAAI.

[5]  Ziming Zhao,et al.  SocialImpact: Systematic Analysis of Underground Social Dynamics , 2012, ESORICS.

[6]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[7]  William M. Rand,et al.  Objective Criteria for the Evaluation of Clustering Methods , 1971 .

[8]  Nicolas Christin,et al.  Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.

[9]  Richard Frank,et al.  Identifying digital threats in a hacker web forum , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[10]  Paulo Shakarian,et al.  Socio-Cultural Modeling for Cyber Threat Actors , 2016, AAAI Workshop: Artificial Intelligence for Cyber Security.

[11]  Hsinchun Chen,et al.  Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[12]  Paulo Shakarian,et al.  Exploring Malicious Hacker Forums , 2016, Cyber Deception.

[13]  Hsinchun Chen Dark Web: Exploring and Data Mining the Dark Side of the Web , 2011 .