ANALYSING CYBERCRIME UNDERGROUND ECONOMY USING DATA ANALYTICS
Keywords:
Digital hazard, Crime-as-a-Service, Cybercrime, Design Science, Examination, Strategy, Web Application.Abstract
Given the rapid acceleration of digital hazards, little work has been carried out into the subject's institutions or procedures that could help to guide scientists and specialists in Information Systems that handle digital security. There is also no discussion of Crime as a Service that is a criminal action program which facilitates decentralized cyber-crime. The examination whole and useful cyber- crime issue that we see has persuaded us to research underground cybercrime economy by adopting information research strategy from a scientific point of view of the structure. To accomplish this objective, we will propose 1. a structure to information investigation to break down the underground cyber-crime, 2. CaaS and product definitions for wrong-doing and 3. a model for related order. Furthermore, 4. Create a software web-app to show how the proposed system and request structure can really be actualized. At that point, we will use web applications to explore the under-ground economy of cyber-crime by breaking down a huge data-set from the web-based network. In implementing the strategy- based structure science review, this review applies objects, institutions, and strategies to the project here. It also gives professional expertise to recommend rules on how governments and associations can plan underground cybercrime assaults in all businesses.
Downloads
References
K. Hughes, ―Entering the world-wide web,‖ ACM SIGWEB Newsl., vol. 3, no. 1, pp. 4–8, 1994.
R.Venkateswaran, 2001. Crimeware as a service Survey of commoditized crimeware in the underground market.
S. W. Brenner, ―Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships,‖ N. C. J. Law & Technol., vol. 4, no. 1, pp. 1- 50, 2002.
F. Greitzer, A. Moore, D. Cappelli, D. Andrews, L. Carroll, and T. Hull, Jan./Feb. 2008. Combating the insider cyber threat.
K.K R. Choo,‖Orgainsed Crime Groups in Cyberspace: a Typology,‖ Trends in Organized Crime, vol. 11, no3, pp.270-295, 2008.
A. K. Sood and R. J. Enbody, ―Crimeware-as-a-service—A survey of commoditized crimeware in the underground market,‖ Int. J. Crit. Infer. Prot., vol. 6, no. 1, pp. 28–38, 2013.
K. S. Wilson and M. A. Kiyvol. 2, pp.116-124, 2014. Some Fundamental Cyber security concepts.
D. Lin, Y. Lv, and D. Cao,(2015) ‗‗Rumour diffusion purpose analysis from social attribute to social content,‖ in Proc. Int. Conf. Asian Lang. Process. (IALP), Suzhou,China,Oct.2015,pp.107-110,DOI:10.1109/IALP.2015.7451543.
E.Serrano, C . A. Iglesias, and M. Garijo (2015) ―A novel agent-based rumour spreading model in Twitter,‖ in Proc. 24th Int. Conf. World Wide Web(WWW),New York,NY,USA,2015,pp. 811-814
―FACT SHEET: Cyber security National Action Plan,‖ Ed: The White House, 2016.
A. Sajid, H. Abbas, and K. Saleem, pp. 1375–1384, 2016. Cloud-Assisted IoT-Based SCADA System Security: A Review of the State of the Art and Future Challenges.
A. Sood and S. Zeadally, 2016. Drive-by Download Attacks: A Comparative Study of Browser Exploit Packs Features and Attack Techniques.
P. Vij and A. Kumar,(2016) ―Effect of rumor propagation on stock market dynamics using cellular automata,‖inProc.Int Conf. Inventive Compute Technol.(ICICT), Coimbatore, India,Aug. 2016,pp. 1-8, DOI:10.1109/INVENTIVE.2016.7830114.
A.Sajid, H. Abbas, and K. Saleem pp. 1375-1384, 2016. Cloud-Assisted Iot - Based SCADA System Security: A Review of the State of the Art and Future Challenges.
J. C. Wong and O. Solon. (2017, May 12). ―Massive ransom ware cyber- attack hits nearly 100 countries around the world‖.
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.