Skip to main content

Showing 1–5 of 5 results for author: Gonen, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.01448  [pdf, other

    cs.CR cs.CY cs.LG

    Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)

    Authors: Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad Elsayed

    Abstract: In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hacker's forums which contain indicators of compromise that can be explo… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 9 pages, 5 figures. Preprint

  2. Is Cryptojacking Dead after Coinhive Shutdown?

    Authors: Said Varlioglu, Bilal Gonen, Murat Ozer, Mehmet F. Bastug

    Abstract: Cryptojacking is the exploitation of victims' computer resources to mine for cryptocurrency using malicious scripts. It has become popular after 2017 when attackers started to exploit legal mining scripts, especially Coinhive scripts. Coinhive was actually a legal mining service that provided scripts and servers for in-browser mining activities. Nevertheless, over 10 million web users had been vic… ▽ More

    Submitted 13 March, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: Proceedings of the 3rd International Conference on Information and Computer Technologies (ICICT 2020) 385-389

  3. Plunge into the Underworld: A Survey on Emergence of Darknet

    Authors: Victor Adewopo, Bilal Gonen, Said Varlioglu, Murat Ozer

    Abstract: The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can only be accessed using special network configuration and software tools to access its contents which are not indexed by search engines. Over the years darknets t… ▽ More

    Submitted 17 March, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: 6th Annual Conference on Computational Science & Computational Intelligence (CSCI'19); Dec 05-07, 2019; Las Vegas, Nevada, USA

  4. A Prevention and a Traction System for Ransomware Attacks

    Authors: Murat Ozer, Said Varlioglu, Bilal Gonen, Mehmet F. Bastug

    Abstract: Over the past three years, especially following WannaCry malware, ransomware has become one of the biggest concerns for private businesses, state, and local government agencies. According to Homeland Security statistics, 1.5 million ransomware attacks have occurred per year since 2016. Cybercriminals often use creative methods to inject their malware into the target machines and use sophisticated… ▽ More

    Submitted 17 March, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Journal ref: 6th Annual Conf. on Computational Science & Computational Intelligence (CSCI'19); Dec 05-07, 2019; Las Vegas, Nevada, USA

  5. User characterization for online social networks

    Authors: Tayfun Tuna, Esra Akbas, Ahmet Aksoy, Muhammed Abdullah Canbaz, Umit Karabiyik, Bilal Gonen, Ramazan Aygun

    Abstract: Online social network analysis has attracted great attention with a vast number of users sharing information and availability of APIs that help to crawl online social network data. In this paper, we study the research studies that are helpful for user characterization as online users may not always reveal their true identity or attributes. We especially focused on user attribute determination such… ▽ More

    Submitted 26 December, 2016; v1 submitted 12 November, 2016; originally announced November 2016.

    Journal ref: Soc. Netw. Anal. Min. (2016) 6: 104. doi:10.1007/s13278-016-0412-3