The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan.-Feb. (2013 vol.17)
pp: 60-68
Aditya K. Sood , Michigan State University
Richard J. Enbody , Michigan State University
ABSTRACT
Cybercrime's tentacles reach deeply into the Internet. A complete, underground criminal economy has developed that lets malicious actors steal money through the Web. The authors detail this enterprise, showing how information, expertise, and money flow through it. Understanding the underground economy's structure is critical for fighting it.
INDEX TERMS
Computer crime, Malware, Internet, Government policies, Computer security, botnets, cybercrime, cyber warfare, underground economy, malware, exploit packs, hacking, vulnerabilities
CITATION
Aditya K. Sood, Rohit Bansal, Richard J. Enbody, "Cybercrime: Dissecting the State of Underground Enterprise", IEEE Internet Computing, vol.17, no. 1, pp. 60-68, Jan.-Feb. 2013, doi:10.1109/MIC.2012.61
REFERENCES
1. M.D. Goodman, “Why the Police Don't Care about Computer Crime,” Harvard J. Law & Technology, vol. 10, no. 3, 1997, pp. 465–494.
2. C. Simmons et al., AVOIDIT: A Cyber Attack Taxonomy, tech. report, Univ. of Memphis, Oct. 2009; http://issrl.cs.memphis.edu/files/papers CyberAttackTaxonomy_IEEE_Mag.pdf.
3. H.K.H. Chan, “A Comparative Study of Reported and Unreported Computer Crimes,” doctoral dissertation, Hong Kong Univ. Science and Technology, 2000; http://dl.acm.orgcitation.cfm?id=932832.
4. Unsecured Economies: Protecting Vital Information, tech. report, McAfee, 2009; www.cerias.purdue.edu/assets/pdfmfe_unsec_econ_pr_rpt_fnl_online_012109.pdf .
5. R. Clandos, “Eye on Cybercrime,” IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 10–11.
6. C.P. Meinel, “Cybercrime Treaty Could Chill Research,” IEEE Security & Privacy, vol. 2, no. 4, 2004, pp. 28–32.
7. B. Stone-Gross et al., “Peering through the Iframe,” Proc. IEEE INFOCOM, IEEE, 2011, pp. 411–415.
8. F.-H. Hsu et al., “BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks,” IEEE J. Selected Areas in Communications, vol. 29, no. 7, 2011, pp. 1461–1468.
9. A.K. Sood and R.J. Enbody, “A Browser Malware Taxonomy,” Virus Bull., vol. 23, no. 6, 2011, pp. 8–12.
10. R. Branco, “Into the Darkness — Dissecting Targeted Attacks,” blog, 30 Nov. 2011; https://community.qualys.com/blogs/securitylabs/ 2011/11/30dissecting-targeted-attacks .
11. Advanced Persistent Threats, tech. report, McAfee, 2010; www.mcafee.com/us/resources/solution-briefs sb-advanced-persistent-threats.pdf.
12. M. Daly, “The Advanced Persistent Threat (Information Force Operations),” Proc. 23rd Usenix Large Installation System Administration Conf . (LISA 09), Usenix Assoc., 2009; www.usenix.org/event/lisa09/tech/slidesdaly.pdf .
13. Vulnerability Based Protection and the Google Operation “Aurora” Attack, tech. report, NSS Labs, 2010; www.nsslabs.com/reportsvulnerability-based-protection-and-google-operation-aurora-attack-q1-2010 .
14. The Command Structure of the Aurora Botnet, tech. report, Damballa, 2010; www.damballa.com/downloads/r_pubsAurora_Botnet_Command_Structure.pdf .
15. J. Caballero et al., “Measuring Pay-per-Install: The Commoditization of Malware Distribution,” Proc. 20th Usenix Conf. Security, Usenix Assoc., 2011, p. 13; http://static.usenix.org/events/sec11/tech/ full_papersCaballero.pdf.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool