Automatic identification of replicated criminal websites using combined clustering

25Citations
Citations of this article
49Readers
Mendeley users who have this article in their library.

Abstract

To be successful, cyber criminals must figure out how to scale their scams. They duplicate content on new websites, often staying one step ahead of defenders that shut down past schemes. For some scams, such as phishing and counterfeit-goods shops, the duplicated content remains nearly identical. In others, such as advanced-fee fraud and online Ponzi schemes, the criminal must alter content so that it appears different in order to evade detection by victims and law enforcement. Nevertheless, similarities often remain, in terms of the website structure or content, since making truly unique copies does not scale well. In this paper, we present a novel combined clustering method that links together replicated scam websites, even when the criminal has taken steps to hide connections. We evaluate its performance against two collected datasets of scam websites: fake-escrow services and high-yield investment programs (HYIPs). We find that our method more accurately groups similar websites together than does existing general-purpose consensus clustering methods.

Cite

CITATION STYLE

APA

Drew, J., & Moore, T. (2014). Automatic identification of replicated criminal websites using combined clustering. In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2014-January, pp. 116–123). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW.2014.26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free