This research explores the use of hacker forums to enhance cyber threat intelligence (CTI) by identifying mobile malware and key hackers before attacks occur. Utilizing recurrent neural networks and social network analysis, the study finds that many mobile malware attachments are zipped Android apps created by prominent threat actors. This proactive approach aims to improve cybersecurity by leveraging external, open-source information from hacker forums.
-
Grisham, John, et al. "Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence." 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, 2017.
-
Members
- IC Essentials
- V0RT3X
- JoelR
- StevenM
- Chris Anderson
- TomCat
- Adriano Faria
- opentype
- Nathan Explosion
- Square Wheels
- eliteone
- bernhara
- GrantHorizons
- terabyte
- Split
- onlyME
- Sinistra
- DawPi
- Como
- Hong98
- eivindsimensen
- abobader
- PPlanet
- NewVicious
- UrbanNest Realtors
- Ioannis D
- Paul Cojocariu
- burnyourfeelings
- Maxius
- Yurii
- Voyage
- Steph40
- Videoflicks
- rnorth6920
- Matt
- ArashDev
- Dancho Danchev
- Voidcraft Studios
- Jon Erickson
- ButterflyPixel
- ReyDev
- Live Games
- Charlie Feigel
- Bob Schwarz
- aLEX49566
- bdmusic 24
- AdamOnTech
- william trowbridge
- aXenDev
- Astronis
- Labis
- adik
- DaninMS
- PrettyPixels
- ali hagi
- A Zayed
- Ticulica
- N700
- envy
- TheLlamaman
- John Horton
- Ramses
- Analog
- IPS THEME
- isvans
- Jimmy Huseman
- Claudia999
- Venthas
- Kirill Gromov
- Dilip
- Majster87
- AnonDoggo
- Empire
- XwReK
- COSMIN
- Hexzon
- GazzaGarratt
- Auto Evoke
- JoeyM
- Ryan
- master963
- TwinTurbo
- Uncrowned Gaurd
- Foxtrek64
- bing11
- Andy Y
- Copycat
- Karyexo Karyexooo
- Kelkrel
- Myr
- dolphin
- Richard Arch
- yaotzin
- lanc3lot
- Brian
- Nicolas PC
- Synergy
- Maria
- Nomad
- scaz