• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hong Geng, Yang Sen, Ye Han, Yang Zhemin, Yang Min. Detection and Analysis Technology of Cybercrime[J]. Journal of Computer Research and Development, 2021, 58(10): 2120-2139. DOI: 10.7544/issn1000-1239.2021.20210855
Citation: Hong Geng, Yang Sen, Ye Han, Yang Zhemin, Yang Min. Detection and Analysis Technology of Cybercrime[J]. Journal of Computer Research and Development, 2021, 58(10): 2120-2139. DOI: 10.7544/issn1000-1239.2021.20210855

Detection and Analysis Technology of Cybercrime

Funds: This work was supported by the National Natural Science Foundation of China (U1836213).
More Information
  • Published Date: September 30, 2021
  • With the rapid growth of information technology, people’s daily activities have been gradually moving to cyberspace. Online activities also play an increasingly important role national economy. While the Internet greatly facilitated our daily life, more and more criminal activities that threaten our daily life, have also moved to cyberspace. Therefore, how to understand, evaluate, prevent, and combat cybercrimes have become the focus of attention of academia, industry, and law enforcement agencies. Recently, researchers pay much attention to the prevention, evaluation, and countermeasures of cybercrimes. However, until now, only a few researchers focus on the overview of cybercrime. Also, there is an urgent need for systemization of the entire cybercrime kill chain. This paper starts from some classic cybercrime attacks such as phishing, scam, and cryptojacking, and then an in-depth analysis of their supporting techniques is conducted, including blackhat SEO and typosquatting. To analyze the cybercrime kill chain, we also investigate the cybercrime infrastructures such as underground market, botnet, and money laundering. Finally, we discuss the existing challenges and trends of cybercrime research.
  • Related Articles

    [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
    [2]Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang. Survey of Artificial Intelligence Based IoT Malware Detection[J]. Journal of Computer Research and Development, 2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
    [3]Pan Jianwen, Cui Zhanqi, Lin Gaoyi, Chen Xiang, Zheng Liwei. A Review of Static Detection Methods for Android Malicious Application[J]. Journal of Computer Research and Development, 2023, 60(8): 1875-1894. DOI: 10.7544/issn1000-1239.202220297
    [4]Fan Zhaoshan, Wang Qing, Liu Junrong, Cui Zelin, Liu Yuling, Liu Song. Survey on Domain Name Abuse Detection Technology[J]. Journal of Computer Research and Development, 2022, 59(11): 2581-2605. DOI: 10.7544/issn1000-1239.20210121
    [5]Yang Zheng, Yin Qilei, Li Haoran, Miao Yuanli, Yuan Dong, Wang Qian, Shen Chao, Li Qi. Study of Wechat Sybil Detection[J]. Journal of Computer Research and Development, 2021, 58(11): 2319-2332. DOI: 10.7544/issn1000-1239.2021.20210461
    [6]Yang Wang, Gao Mingzhe, Jiang Ting. A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1021-1034. DOI: 10.7544/issn1000-1239.2021.20200912
    [7]Wang Jialai, Zhang Chao, Qi Xuyan, Rong Yi. A Survey of Intelligent Malware Detection on Windows Platform[J]. Journal of Computer Research and Development, 2021, 58(5): 977-994. DOI: 10.7544/issn1000-1239.2021.20200964
    [8]Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang. The Malware Detection Based on Data Breach Actions[J]. Journal of Computer Research and Development, 2017, 54(7): 1537-1548. DOI: 10.7544/issn1000-1239.2017.20160436
    [9]Li Peng, Wang Ruchuan, Wu Ning. Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features[J]. Journal of Computer Research and Development, 2012, 49(5): 949-957.
    [10]Dai Hua, Qin Xiaolin, and Bai Chuanjie. A Malicious Transaction Detection Method Based on Transaction Template[J]. Journal of Computer Research and Development, 2010, 47(5): 921-929.

Catalog

    Article views (1185) PDF downloads (656) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return