2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) 2020
DOI: 10.1109/iotsms52051.2020.9340224
|View full text |Cite
|
Sign up to set email alerts
|

An exploration of the cybercrime ecosystem around Shodan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…In order to find the hidden relationship of darknet users, several studies have been proposed to identify key players of the underground forum [19,20]; while some other works analyzed roles, influence levels, and social relationships of key actors [21]. Sun et al [22] proposed a method that utilizes uploaded text data from forums to reveal private interactions among users, and Bada et al [23] explored the prominent use cases of the specific search engine Shodan to highlight hackers' targets and motivations.…”
Section: Darknet User Data Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In order to find the hidden relationship of darknet users, several studies have been proposed to identify key players of the underground forum [19,20]; while some other works analyzed roles, influence levels, and social relationships of key actors [21]. Sun et al [22] proposed a method that utilizes uploaded text data from forums to reveal private interactions among users, and Bada et al [23] explored the prominent use cases of the specific search engine Shodan to highlight hackers' targets and motivations.…”
Section: Darknet User Data Analysismentioning
confidence: 99%
“…In order to further increase anonymity and avoid tracing of activities of darknet users, the darknet markets frequently transform their IP addresses or domain names [2,6,7], and allow only cryptocurrencies like Bitcoin [4] or Ethereum [5] for the anonymous transactions [8][9][10][11][12][13][14][15][16]. In addition, most of the useful information for user identification is hidden by the darknet market operators or the other additional anonymous technologies [17][18][19][20][21][22][23]. Especially, many darknet market vendors create multiple accounts, called Sybil accounts, within the same market or across different darknet marketplaces.…”
Section: Introductionmentioning
confidence: 99%
“…1 At the time of writing, CrimeBB contains more than 100 million posts, some dating back more than 20 years. The dataset has been extensively used for cybercrime research (e.g., [14], [16], [24], [26], [27], [28], [29]).…”
Section: B Underground Forums and Crimebbmentioning
confidence: 99%
“…Nawrocki et al reported that unprotected ICS communications were detected by monitoring traffic at an Internet exchange [25]. As for device discovery using Shodan, Bada and Pete [26] surveyed the cybercrime ecosystem, and they clarified that Shodan was used for finding attack targets.…”
Section: A Device Discoverymentioning
confidence: 99%