AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis

Sagar Samtani, Kory Chinn, Cathy Larson, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Scopus citations

Abstract

Cyber threats pose grave national security dangers to the US. Many cyber-Attacks today are executed with ever-growing collection of malicious tools. Cyber threat intelligence (CTI) and malware analysis portals aim to provide knowledge and tools to help prevent and mitigate attacks. However, current CTI and malware analysis portals and techniques have been criticized for being too reactive as they rely on data collected from past cyber-Attacks. Online hacker forums provide a novel source of data that can inform a proactive CTI and malware portal. This research demonstrates the AZSecure Hacker Assets Portal. This portal collects and analyzes malicious assets directly from the largely untapped and rich data source of online hacker communities by utilizing state-of-The-Art machine learning techniques. This paper explores the development and evolution of the AZSecure Hacker Assets Portal. We also present key portal functionalities such as asset searching, browsing, and downloading, source code visualizations and code comparison analytics, and an interactive CTI dashboard.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationCybersecurity and Big Data, ISI 2016
EditorsWenji Mao, G. Alan Wang, Lina Zhou, Lisa Kaati
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages19-24
Number of pages6
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Publication series

NameIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
Country/TerritoryUnited States
CityTucson
Period9/28/169/30/16

Keywords

  • cyber threat intelligence
  • hacker community
  • hacker portal
  • malware analysis
  • topic modeling

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis'. Together they form a unique fingerprint.

Cite this