Crime toolkits: The productisation of cybercrime
- Authors: Alazab, Ammar , Abawajy, Jemal , Hobbs, Michael , Layton, Robert , Khraisat, Ansam
- Date: 2013
- Type: Text , Conference paper
- Relation: Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 p. 1626-1632
- Full Text: false
- Reviewed:
Malware detection and prevention system based on multi-stage rules
- Authors: Alazab, Ammar , Hobbs, Michael , Abawajy, Jemal , Khraisat, Ansam
- Date: 2013
- Type: Text , Journal article
- Relation: International Journal of Information Security and Privacy Vol. 7, no. 2 (2013), p. 29-43
- Full Text: false
- Reviewed:
- Description: The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection System (SIDS) and Anomaly Intrusion Detection System (AIDS). Copyright © 2013, IGI Global.
Trends in Crime Toolkit Development
- Authors: Khraisat, Ansam , Alazab, Ammar , Hobbs, Michael , Abawajy, Jemal , Azab, Ahmad
- Date: 2014
- Type: Text , Book chapter
- Relation: Network Security Technologies : Design and Applications p. 1-330
- Full Text: false
- Reviewed:
- Description: Cybercriminals continue to target online users of banks. They are improving their techniques and using high levels of skill in their attacks. Their continued search for different methods to commit crime makes the existing protection system less effective. They have developed crime toolkits which have become more accessible and simpler to use, and this has attracted more cybercriminals to cybercrime. In this chapter, the authors study the methods that are used in crime toolkits. They present the development and current trend of crime toolkits and reveal the methods that have been used to commit cybercrime successfully.