Towards Effective Cybercrime Intervention
- URL: http://arxiv.org/abs/2211.09524v1
- Date: Thu, 17 Nov 2022 13:40:53 GMT
- Title: Towards Effective Cybercrime Intervention
- Authors: Jonathan W. Z. Lim and Vrizlynn L. L. Thing
- Abstract summary: We propose to build a systematic framework through the lens of a cyber threat actor.
We explore the motivation factors behind the crimes and the crime stages of the threat actors.
We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.
- Score: 1.179179628317559
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Cybercrimes are on the rise, in part due to technological advancements, as
well as increased avenues of exploitation. Sophisticated threat actors are
leveraging on such advancements to execute their malicious intentions. The
increase in cybercrimes is prevalent, and it seems unlikely that they can be
easily eradicated. A more serious concern is that the community may come to
accept the notion that this will become the trend. As such, the key question
revolves around how we can reduce cybercrime in this evolving landscape. In our
paper, we propose to build a systematic framework through the lens of a cyber
threat actor. We explore the motivation factors behind the crimes and the crime
stages of the threat actors. We then formulate intervention plans so as to
discourage the act of committing malicious cyber activities and also aim to
integrate ex-cyber offenders back into society.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Different Cybercrimes and their Solution for Common People [0.0]
This paper explores cybercrime trends and highlights the need for cybercrime awareness (cyberawareness) to mitigate vulnerabilities.
We present a list of 31 technical as well as non-technical solutions considering that a "common man" may not be technologically aware.
arXiv Detail & Related papers (2024-10-08T04:23:11Z) - Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks [0.0]
This paper delves into the escalating threat posed by the misuse of AI, specifically through the use of Large Language Models (LLMs)
Through a series of controlled experiments, the paper demonstrates how these models can be manipulated to bypass ethical and privacy safeguards to effectively generate cyber attacks.
We also introduce Occupy AI, a customized, finetuned LLM specifically engineered to automate and execute cyberattacks.
arXiv Detail & Related papers (2024-08-23T02:56:13Z) - The TikToking troll and weaponization of conscience: A systems perspective case study [0.0]
Weaponization of conscience is a tactic used by fraudsters to camouflage their activity, deceive their victims, and extend the effectiveness of their modi operandi.
This case study centers around a controversial TikToker, highlighting how the weaponization of conscience can be leveraged to manipulate multiple actors within a propagandist's target population.
arXiv Detail & Related papers (2024-04-14T21:05:40Z) - Cyber Sentinel: Exploring Conversational Agents in Streamlining Security Tasks with GPT-4 [0.08192907805418582]
This paper introduces Cyber Sentinel, an innovative task-oriented cybersecurity dialogue system.
It embodies the fusion of artificial intelligence, cybersecurity domain expertise, and real-time data analysis to combat the multifaceted challenges posed by cyber adversaries.
Our work is a novel approach to task-oriented dialogue systems, leveraging the power of chaining GPT-4 models combined with prompt engineering.
arXiv Detail & Related papers (2023-09-28T13:18:33Z) - Exploring Cybercriminal Activities, Behaviors and Profiles [2.7195102129095003]
This article explores cybercriminal activities and behavior from a psychology and human aspects perspective.
We examine motivations, psychological and other interdisciplinary concepts as they may impact/influence cybercriminal activities.
arXiv Detail & Related papers (2023-08-30T10:57:19Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Initiative Defense against Facial Manipulation [82.96864888025797]
We propose a novel framework of initiative defense to degrade the performance of facial manipulation models controlled by malicious users.
We first imitate the target manipulation model with a surrogate model, and then devise a poison perturbation generator to obtain the desired venom.
arXiv Detail & Related papers (2021-12-19T09:42:28Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.