804
Views
14
CrossRef citations to date
0
Altmetric
Articles

The network structure of malware development, deployment and distribution

&

Bibliography

  • Abbasi, A., W. Li, V. Benjamin, S. Hu, and H. Chen. “Descriptive Analytics: Examining Expert Hackers in Web Forums.” 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), 56–63. The Hague, September 24–26. IEEE, 2014.
  • Albert, R., and A.-L. Barabási. “Statistical Mechanics of Complex Networks.” Reviews of Modern Physics 74, no. 1 (2002): 47–97. doi:10.1103/RevModPhys.74.47.
  • Barabási, A. L., Z. Dezso, E. Ravasz, S. H. Yook, and Z. Oltvai. “Scale‐Free and Hierarchical Structures in Complex Networks.” In Modeling of Complex Systems: Seventh Granada Lectures, edited by P. L. Garrido and J. Marro, 1–16. Vol. 661, No. 1. Granada: AIP Publishing, 2003.
  • Blondel, V. D., J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. “Fast Unfolding of Communities in Large Networks.” Journal of Statistical Mechanics: Theory and Experiment 2008, no. 10 (2008): 1–12. doi:10.1088/1742-5468/2008/10/P10008.
  • Borgatti, S. P., M. G. Everett, and L. C. Freeman. UCINET VI. Software for Social Network Analysis. Natick: Analytic Technologies, 2012.
  • Borgatti, S. P., M. G. Everett, and J. C. Johnson. Analyzing Social Networks. Thousand Oaks, CA: SAGE Publications, 2013.
  • Brenner, S. W. Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press, 2009.
  • Broadhurst, R., P. Grabosky, M. Alazab, B. Bouhours, and S. Chon. “An Analysis of the Nature of Groups Engaged in Cyber Crime. An Analysis of the Nature of Groups Engaged in Cyber Crime.” International Journal of Cyber Criminology 8, no. 1 (2014): 1–20.
  • Burt, R. S. “The Network Structure of Social Capital.” Research in Organizational Behavior 22 (2000): 345–423. doi:10.1016/S0191-3085(00)22009-1.
  • Cobb, N. K., A. L. Graham, and D. B. Abrams. “Social Network Structure of a Large Online Community for Smoking Cessation.” American Journal of Public Health 100, no. 7 (2010): 1282–1289. doi:10.2105/AJPH.2009.165449.
  • Décary-Hétu, D., and B. Dupont. “The Social Network of Hackers.” Global Crime 13, no. 3 (2012): 160–175. doi:10.1080/17440572.2012.702523.
  • Décary-Hétu, D., and A. Leppänen. “Criminals and Signals: An Assessment of Criminal Performance in the Carding Underworld.” Security Journal (2013): 1–19.
  • Dingman, S., S. Silcoff, and R. Greenspan. 2014. “Hackers: The Escalating Arms Race against Cybercrime.” The Globe and Mail, November 24. http://www.theglobeandmail.com/report-on-business/hacked-the-escalating-arms-race against-cybercrime/article21305464/?page=all
  • Dorogovtsev, S. N., and J. F. F. Mendes. Evolution of Networks, From Biological Nets to the Internet and WWW. Oxford: Oxford University Press, 2003.
  • Everton, S. F. “Network Topography, Key Players, and Terrorist Networks.” Connections 32, no. 1 (2009): 12–19.
  • Freeman, L. C. “Centrality in Social Networks: Conceptual Clarification.” Social Networks 1, no. 3 (1979): 215–239. doi:10.1016/0378-8733(78)90021-7.
  • Gephi Consortium. “Gephi.” Computer program (version 0.8. 2 Beta). Accessed October 14, 2014. http://gephi.github.io/
  • Granovetter, M. S. “The Strength of Weak Ties.” American Journal of Sociology 78, no. 6 (1973): 1360–1380. doi:10.1086/225469.
  • Granovetter, M. S. “Ignorance, Knowledge, and Outcomes in a Small World.” Science 301, no. 5634 (2003): 773–774. doi:10.1126/science.1088508.
  • Hanneman, R. A., and M. Riddle. Introduction to Social Network Methods. Riverside: University of California, 2005.
  • Haythornthwaite, C. “Exploring Multiplexity: Social Network Structures in a Computer Supported Distance Learning Class.” The Information Society 17, no. 3 (2001): 211–226. doi:10.1080/01972240152493065.
  • Hein, O., M. Schwind, and W. König. “Scale-Free Networks.” Wirtschaftsinformatik 48, no. 4 (2006): 267–275. doi:10.1007/s11576-006-0058-2.
  • Hellström, T. “Critical Infrastructure and Systemic Vulnerability: Towards a Planning Framework.” Safety Science 45, no. 3 (2007): 415–430. doi:10.1016/j.ssci.2006.07.007.
  • Holt, T. J. “Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures.” Deviant Behavior 28, no. 2 (2007): 171–198. doi:10.1080/01639620601131065.
  • Holt, T. J. “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry using On‐line Data.” Journal of Criminal Justice Education 21, no. 4 (2010): 466–487. doi:10.1080/10511253.2010.516565.
  • Holt, T. J. “Exploring the Intersections of Technology, Crime, and Terror.” Terrorism and Political Violence 24, no. 2 (2012): 337–354. doi:10.1080/09546553.2011.648350.
  • Holt, T. J. “Examining the Forces Shaping Cybercrime Markets Online.” Social Science Computer Review 31, no. 2 (2013): 165–177. doi:10.1177/0894439312452998.
  • Holt, T. J. “Exploring the Social Organisation and Structure of Stolen Data Markets.” Global Crime 14, no. 2–3 (2013): 155–174. doi:10.1080/17440572.2013.787925.
  • Holt, T. J., and E. Lampke. “Exploring Stolen Data Markets Online: Products and Market Forces.” Criminal Justice Studies 23, no. 1 (2010): 33–50. doi:10.1080/14786011003634415.
  • Holt, T. J., D. Strumsky, O. Smirnova, and M. Kilger. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6, no. 1 (2012): 891–903.
  • Hutchings, A., and T. J. Holt. “A Crime Script Analysis of the Online Stolen Data Market.” British Journal of Criminology 55, no. 3 (2015): 596–614. doi:10.1093/bjc/azu106.
  • IBM. IBM X-Force Threat Intelligence Quarterly 1Q 2014. 2014.
  • Jordan, T., and P. Taylor. “A Sociology of Hackers.” The Sociological Review 46, no. 4 (1998): 757–780. doi:10.1111/sore.1998.46.issue-4.
  • Kalm, K. “Illicit Network Structures in Cyberspace.” In 2013 5th International Conference on Cyber Conflict (CyCon), edited by K. Poding, J. Stinissen, and M. Maybaum, 217–229, June 4–7. IEEE, 2013.
  • Kilger, M., O. Arkin, and J. Stutzman. “Profiling.” In Know Your Enemy: Learning About Security Threats, 2nd ed, edited by The Honeynet Project, 505–556. Know Your Enemy. Addison Wesley Professional, 2004.
  • Lu, Y., X. Luo, M. Polgar, and Y. Cao. “Social Network Analysis of a Criminal Hacker Community.” The Journal of Computer Information Systems 51, no. 2 (2010): 31.
  • Macdonald, M., R. Frank, J. Mei, B. Monk, J. Mei, and B. Monk “Identifying Digital Threats in a Hacker Web Forum.” Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, Paris, August 26–27, 926–933. ACM, 2015.
  • McGuire, M. Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security, 2012.
  • Morselli, C. Inside Criminal Networks. New York: Springer, 2009.
  • Motoyama, M., D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. “An Analysis of Underground Forums.” Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement, Berlin, November 2–4, 71–80. ACM, 2011.
  • Newman, M. E. J. “Modularity and Community Structure in Networks.” Proceedings of the National Academy of Sciences 103, no. 23 (2006): 8577–8582. doi:10.1073/pnas.0601602103.
  • Newman, M. E. J. “The Mathematics of Networks.” The New Palgrave Encyclopedia of Economics 2, no. 2008 (2008): 1–12.
  • Onnela, J.-P., J. Saramäki, J. Hyvönen, G. Szabó, D. Lazer, K. Kaski, J. Kertész, and A.-L. Barabási. “Structure and Tie Strengths in Mobile Communication Networks.” Proceedings of the National Academy of Sciences 104, no. 18 (2007): 7332–7336. doi:10.1073/pnas.0610245104.
  • Ponemon Institute. 2015 Megatrends in Cybersecurity. 2015.
  • Raab, J., and H. Brinton Milward. “Dark Networks as Problems.” Journal of Public Administration Research and Theory 13, no. 4 (2003): 413–439. doi:10.1093/jopart/mug029.
  • Ravasz, E., and A.-L. Barabási. “Hierarchical Organization in Complex Networks.” Physical Review E 67, no. 2 (2003): 026112. doi:10.1103/PhysRevE.67.026112.
  • Ravasz, E., A. L. Somera, D. A. Mongru, Z. N. Oltvai, and A.-L. Barabási. “Hierarchical Organization of Modularity in Metabolic Networks.” Science 297, no. 5586 (2002): 1551–1555. doi:10.1126/science.1073374.
  • Ravid, G., and S. Rafaeli. “Asynchronous Discussion Groups as Small World and Scale Free Networks.” First Monday 9, no. 9 (2004). doi:10.5210/fm.v9i9.1170.
  • Soudijn, M. R. J., and B. C. H. T. Zegers. “Cybercrime and Virtual Offender Convergence Settings.” Trends in Organized Crime 15, no. 2–3 (2012): 111–129. doi:10.1007/s12117-012-9159-z.
  • Streeter, C. L., and D. F. Gillespie. “Social Network Analysis.” Journal of Social Service Research 16, no. 1–2 (1993): 201–222. doi:10.1300/J079v16n01_10.
  • Symantec. Symantec Internet Security Threat Report: Trends for 2010. Vol. 16. 2011.
  • Symantec. Symantec Internet Security Threat Report: Trends for 2015. Vol. 20. 2015.
  • Trend Micro. Report on Cybersecurity and Critical Infrastructure in the Americas. 2015.
  • United Nations. 2015. “Cybersecurity: A Global Issue Demanding a Global Approach.” United Nations Department of Economic and Social Affairs. http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html
  • Von Lampe, K. “Making the Second Step Before the First: Assessing Organized Crime.” Crime, Law and Social Change 42, no. 4–5 (2005): 227–259. doi:10.1007/s10611-005-5305-8.
  • Wang, Q.-H., W. T. Yue, and K.-L. Hui. “Do Hacker Forums Contribute to Security Attacks?” In 10th Workshop on E-Business, Web, edited by M. J. Shaw, D. Zhang, and W. T. Yue, Shanghai, December 4, 143–152. Springer Berlin Heidelberg, 2012.
  • Wasserman, S., and K. Faust. Social Network Analysis: Methods and Applications. Vol. 8. New York: Cambridge University Press, 1994.
  • Watts, D. J. “Networks, Dynamics, and the Small-World Phenomenon 1.” American Journal of Sociology 105, no. 2 (1999): 493–527. doi:10.1086/210318.
  • Watts, D. J., and S. H. Strogatz. “Collective Dynamics of ‘Small-World’ Networks.” Nature 393, no. 6684 (1998): 440–442. doi:10.1038/30918.
  • Xu, J., and H. Chen. “The Topology of Dark Networks.” Communications of the ACM 51, no. 10 (2008): 58–65. doi:10.1145/1400181.
  • Yip, M., N. Shadbolt, and C. Webber. “Structural Analysis of Online Criminal Social Networks.” 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, DC, June 11–14, 60–65. IEEE, 2012.
  • Zhang, X., and C. Li. “Survival Analysis on Hacker Forums.” SIGBPS Workshop Business Process Service, Milan, December 15, 106–110, 2013.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.