Profiling the Cybercriminal: A Systematic Review of Research
- URL: http://arxiv.org/abs/2105.02930v2
- Date: Tue, 11 May 2021 19:55:52 GMT
- Title: Profiling the Cybercriminal: A Systematic Review of Research
- Authors: Maria Bada and Jason R.C. Nurse
- Abstract summary: There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
- Score: 2.66512000865131
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As cybercrime becomes one of the most significant threats facing society
today, it is of utmost importance to better understand the perpetrators behind
such attacks. In this article, we seek to advance research and practitioner
understanding of the cybercriminal (cyber-offender) profiling domain by
conducting a rigorous systematic review. This work investigates the
aforementioned domain to answer the question: what is the state-of-the-art in
the academic field of understanding, characterising and profiling
cybercriminals. Through the application of the PRISMA systematic literature
review technique, we identify 39 works from the last 14 years (2006-2020). Our
findings demonstrate that overall, there is lack of a common definition of
profiling for cyber-offenders. The review found that one of the primary types
of cybercriminals that studies have focused on is hackers and the majority of
papers used the deductive approach as a preferred one. This article produces an
up-to-date characterisation of the field and also defines open issues deserving
of further attention such as the role of security professionals and law
enforcement in supporting such research, as well as factors including
personality traits which must be further researched whilst exploring online
criminal behaviour. By understanding online offenders and their pathways
towards malevolent behaviours, we can better identify steps that need to be
taken to prevent such criminal activities.
Related papers
- Advancing Crime Linkage Analysis with Machine Learning: A Comprehensive Review and Framework for Data-Driven Approaches [0.0]
Crime linkage is the process of analyzing criminal behavior data to determine whether a pair or group of crime cases are connected or belong to a series of offenses.
This study aims to understand the challenges faced by machine learning approaches in crime linkage and to support foundational knowledge for future data-driven methods.
arXiv Detail & Related papers (2024-10-30T18:22:45Z) - Ethical Hacking and its role in Cybersecurity [0.0]
This review paper investigates the diverse functions of ethical hacking within modern cybersecurity.
It analyzes the progression of ethical hacking techniques, their use in identifying vulnerabilities and conducting penetration tests, and their influence on strengthening organizational security.
arXiv Detail & Related papers (2024-08-28T11:06:17Z) - To Change Or To Stick: Unveiling The Consistency Of Cyber Criminal Signatures Through Statistical Analysis [0.0]
This study unveils the elusive presence of criminal signatures in cyberspace, validating for the first time their existence through statistical evidence.
Our findings verify the existence of unique signatures associated with advanced cybercriminals, bridging a crucial gap in current understanding of human behavior in cyber-attacks.
arXiv Detail & Related papers (2024-08-01T12:08:40Z) - A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures [50.987594546912725]
Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations.
This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures.
arXiv Detail & Related papers (2024-03-31T12:44:48Z) - Exploring Cybercriminal Activities, Behaviors and Profiles [2.7195102129095003]
This article explores cybercriminal activities and behavior from a psychology and human aspects perspective.
We examine motivations, psychological and other interdisciplinary concepts as they may impact/influence cybercriminal activities.
arXiv Detail & Related papers (2023-08-30T10:57:19Z) - Recent Advancements in Machine Learning For Cybercrime Prediction [2.38324507743994]
This paper aims to comprehensively survey the latest advancements in cybercrime prediction.
We reviewed more than 150 research articles and discussed 50 most recent and appropriate ones.
This paper presents a holistic view of cutting-edge developments and publicly available datasets.
arXiv Detail & Related papers (2023-04-10T19:00:29Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Tainted Love: A Systematic Review of Online Romance Fraud [68.8204255655161]
Romance fraud involves cybercriminals engineering a romantic relationship on online dating platforms.
We characterise the literary landscape on romance fraud, advancing the understanding of researchers and practitioners.
Three main contributions were identified: profiles of romance scams, countermeasures for mitigating romance scams, and factors that predispose an individual to become a scammer or a victim.
arXiv Detail & Related papers (2023-02-28T20:34:07Z) - Fairness in Recommender Systems: Research Landscape and Future
Directions [119.67643184567623]
We review the concepts and notions of fairness that were put forward in the area in the recent past.
We present an overview of how research in this field is currently operationalized.
Overall, our analysis of recent works points to certain research gaps.
arXiv Detail & Related papers (2022-05-23T08:34:25Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.