Details



AN IN-DEPTH ANALYSIS OF CYBERCRIME AS AN UNDERGROUND ECONOMY BY EMPLOYING THE DATA ANALYSIS TOOLS AND TECHNIQUES

Neal Bhasin

60-63

Vol 11, Jan-Jun, 2020

Date of Submission: 2020-04-02 Date of Acceptance: 2020-05-16 Date of Publication: 2020-05-23

Abstract

Despite the fast acceleration of digital threats, there has still been some research into the groundwork of the subject or approaches that could direct Information Systems analysts and experts who manage digital shield. Little is called Crime-as-a-Service (CaaS), a crook game plan that upholds cybercrime underground. This research introduces and the utilitarian cybercrime issues we face have animated us to explore the cybercrime underground economy by taking on a data examination procedure from an arrangement science perspective. We proposed a data examination framework for separating the cybercrime underground, CaaS and bad behaviour item definitions, and a related gathering model to achieve this goal. Besides, we encourage a model application to demonstrate the way that we could complete the proposed framework and course of action model. We then, use this application to explore the cybercrime underground economy by taking apart a gigantic dataset from the web hacking neighbourhood. This study adds to the arrangement trinkets, foundations, and methodologies around here by taking on an arrangement science research procedure. Likewise, it gives significant, useful encounters to specialists by proposing rules concerning how law-making bodies and relationship in all organizations can design for attacks by cybercrime underground.

References

  1. J. C. Wong and O. Solon, Massive Ransomware Cyber-Attack Hits Nearly 100 Countries Around the World, May 2017, [online] Available: https://www.theguardian.com/technology/2017/may/12/global-cyber-attack- ransomware-nsa-uk-nhs
  2. FACT SHEET: Cybersecurity National Action Plan, Washington, DC, USA, 2016.
  3. A. K. Sood and R. J. Enbody, 'Crimeware-as-a-serviceā€”A survey of commoditized crimeware in the underground market', Int. J. Crit. Infrastruct. Protect., vol. 6, pp. 28-38, 2013.
  4. S. W. Brenner, 'Organized cybercrime-how cyberspace may affect the structure of criminal relationships', North Carolina J. Law Technol., vol. 4, no. 1, pp. 1-50, 2002.
  5. K. Hughes, 'Entering the World-Wide Web', ACM SIGWEB Newslett., vol. 3, no. 1, pp. 4-8, 2019.
  6. S. Gregor and A. R. Hevner, 'Positioning and presenting design science research for maximum impact', MIS Quart., vol. 37, no. 2, pp. 337-356, 2013.
Download PDF
Back