CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments

@article{Campobasso2019CARONTECA,
  title={CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile Environments},
  author={Michele Campobasso and Pavlo Burda and Luca Allodi},
  journal={2019 IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
  year={2019},
  pages={433-442}
}
The monitoring of underground criminal activities is often automated to maximize the data collection and to train ML models to automatically adapt data collection tools to different communities. On the other hand, sophisticated adversaries may adopt crawling-detection capabilities that may significantly jeopardize researchers' opportunities to perform the data collection, for example by putting their accounts under the spotlight and being expelled from the community. This is particularly… Expand
A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments

References

SHOWING 1-10 OF 46 REFERENCES
PUBCRAWL: Protecting Users and Businesses from CRAWLers
iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network
A Novel Malicious Web Crawler Detector: Performance and Evaluation
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Feature evaluation for web crawler detection with data mining techniques
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale
Client honeypots: Approaches and challenges
  • M. T. Qassrawi, Hongli Zhang
  • Computer Science
  • 4th International Conference on New Trends in Information Science and Service Science
  • 2010
Web robot detection techniques: overview and limitations
...
1
2
3
4
5
...