This research explores the use of hacker forums to enhance cyber threat intelligence (CTI) by identifying mobile malware and key hackers before attacks occur. Utilizing recurrent neural networks and social network analysis, the study finds that many mobile malware attachments are zipped Android apps created by prominent threat actors. This proactive approach aims to improve cybersecurity by leveraging external, open-source information from hacker forums.
-
Grisham, John, et al. "Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence." 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, 2017.
-
Members
- JoelR
- Chris Anderson
- Myr
- Live Games
- IC Essentials
- Nathan Explosion
- Square Wheels
- bernhara
- Auto Evoke
- opentype
- ReyDev
- send2yoni
- Brian
- A Zayed
- Adriano Faria
- terabyte
- Dilip
- ZLTRGO
- adik
- master963
- DawPi
- eivindsimensen
- envy
- onlyME
- V0RT3X
- GazzaGarratt
- Analog
- Voyage
- Paul Kaiser
- Como
- N700
- Paul
- TracyIsland
- Andy Y
- Omar Barbeytia carretero
- JoeyM
- Ryancoolround
- rainx
- YourSharona
- Kentraiyle Robinson
- MichaelR
- Edward Ellas
- IPS THEME
- aXenDev
- PrettyPixels
- Denis Dyack
- Labis
- DursunKaptan
- MissB
- TheLlamaman
- aLEX49566
- Codepixel
- alsl sndnxnx
- burnyourfeelings
- isvans
- Marius
- Matt
- Thomas Taschler
- Surpac
- JoshB
- Ioannis D
- abobader
- Richard Arch
- bdmusic 24
- Majster87
- TomCat
- Pmw
- Torgeir Rui
- Kammer et
- Nicolas PC
- XwReK
- Claudia999
- Kirill Gromov
- Synergy
- bing11
- Marcin Martyniak
- ArashDev
- ali hagi
- StevenM
- NewVicious
- lukash
- Andhrafriends Admin
- Daffy
- hyprem
- GuitarGathering
- Tripp
- Askancy
- MLK
- Jelly Belly
- eveneme eveneme
- Nomad
- Morphe
- lordi
- shahed
- John Horton
- PayMap
- Serval
- Nomer3
- Dennis Maidon
- Zennuie