Measuring the changing cost of cybercrime

R Anderson, C Barton, R Bölme, R Clayton, C Ganán… - 2019‏ - orca.cardiff.ac.uk
In 2012 we presented the rst systematic study of the costs of cybercrime. In this paper, we
report what has changed in the seven years since. The period has seen major platform …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018‏ - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

Detecting phishing sites using chatgpt

T Koide, N Fukushi, H Nakano, D Chiba - arxiv preprint arxiv:2306.05816, 2023‏ - arxiv.org
The emergence of Large Language Models (LLMs), including ChatGPT, is having a
significant impact on a wide range of fields. While LLMs have been extensively researched …

Needle in a haystack: Tracking down elite phishing domains in the wild

K Tian, STK Jan, H Hu, D Yao, G Wang - Proceedings of the Internet …, 2018‏ - dl.acm.org
Today's phishing websites are constantly evolving to deceive users and evade the detection.
In this paper, we perform a measurement study on squatting phishing domains where the …

Hiding in plain sight: A longitudinal study of combosquatting abuse

P Kintis, N Miramirkhani, C Lever, Y Chen… - Proceedings of the …, 2017‏ - dl.acm.org
Domain squatting is a common adversarial practice where attackers register domain names
that are purposefully similar to popular domains. In this work, we study a specific type of …

Double and nothing: Understanding and detecting cryptocurrency giveaway scams

X Li, A Yepuri, N Nikiforakis - … of the Network and Distributed System …, 2023‏ - par.nsf.gov
As cryptocurrencies increase in popularity and users obtain and manage their own assets,
attackers are pivoting from just abusing cryptocurrencies as a payment mechanism, to …

Internet-based social engineering psychology, attacks, and defenses: A survey

TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024‏ - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

A Kharraz, Z Ma, P Murley, C Lever, J Mason… - The World Wide Web …, 2019‏ - dl.acm.org
In-browser cryptojacking is a form of resource abuse that leverages end-users' machines to
mine cryptocurrency without obtaining the users' consent. In this paper, we design …

Plug and prey? measuring the commoditization of cybercrime via online anonymous markets

R Van Wegberg, S Tajalizadehkhoob, K Soska… - 27th USENIX security …, 2018‏ - usenix.org
Researchers have observed the increasing commoditization of cybercrime, that is, the
offering of capabilities, services, and resources as commodities by specialized suppliers in …

BTG: A Bridge to Graph machine learning in telecommunications fraud detection

X Hu, H Chen, S Liu, H Jiang, G Chu, R Li - Future Generation Computer …, 2022‏ - Elsevier
Telecommunications fraud runs rampant recently around the world. Therefore, how to
effectively detect fraudsters has become an increasingly challenging problem. However …