Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert and Khraisat, Ansam 2013, Crime toolkits : the productisation of cybercrime, in TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Piscataway, N.J., pp. 1626-1632, doi: 10.1109/TrustCom.2013.273.
The productisation of crime toolkits is happening at an ever-increasing rate. Previous attacks that required indepth knowledge of computer systems can now be purchased online. Large scale attacks previously requiring months to setup a botnet can now be scheduled for a small fee. Criminals are leveraging this opportunity of commercialization, by compromising web applications and user's browser, to gain advantages such as using the computer's resources for launching further attacks, or stealing data such as identifying information. Crime toolkits are being developed to attack an increasing number of applications and can now be deployed by attackers with little technical knowledge. This paper surveys the current trends in crime toolkits, with a case study on the Zeus botnet. We profile the types of exploits that malicious writers prefer, with a view to predicting future attack trends. We find that the scope for damage is increasing, particularly as specialisation and scale increase in cybercrime.
Field of Research
080303 Computer System Security
Socio Economic Objective
890299 Computer Software and Services not elsewhere classified
HERDC Research category
E2 Full written paper - non-refereed / Abstract reviewed
Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact firstname.lastname@example.org.