@inproceedings{e5213f1d977b45c7aa6f4e21ffe77841,
title = "AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis",
abstract = "Cyber threats pose grave national security dangers to the US. Many cyber-Attacks today are executed with ever-growing collection of malicious tools. Cyber threat intelligence (CTI) and malware analysis portals aim to provide knowledge and tools to help prevent and mitigate attacks. However, current CTI and malware analysis portals and techniques have been criticized for being too reactive as they rely on data collected from past cyber-Attacks. Online hacker forums provide a novel source of data that can inform a proactive CTI and malware portal. This research demonstrates the AZSecure Hacker Assets Portal. This portal collects and analyzes malicious assets directly from the largely untapped and rich data source of online hacker communities by utilizing state-of-The-Art machine learning techniques. This paper explores the development and evolution of the AZSecure Hacker Assets Portal. We also present key portal functionalities such as asset searching, browsing, and downloading, source code visualizations and code comparison analytics, and an interactive CTI dashboard.",
keywords = "cyber threat intelligence, hacker community, hacker portal, malware analysis, topic modeling",
author = "Sagar Samtani and Kory Chinn and Cathy Larson and Hsinchun Chen",
note = "Publisher Copyright: {\textcopyright} 2016 IEEE.; 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 ; Conference date: 28-09-2016 Through 30-09-2016",
year = "2016",
month = nov,
day = "15",
doi = "10.1109/ISI.2016.7745437",
language = "English (US)",
series = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "19--24",
editor = "Wenji Mao and Wang, {G. Alan} and Lina Zhou and Lisa Kaati",
booktitle = "IEEE International Conference on Intelligence and Security Informatics",
}