Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

被引:53
作者
Benjamin, Victor [1 ]
Zhang, Bin [2 ]
Nunamaker, Jay F., Jr. [3 ,4 ,5 ,6 ]
Chen, Hsinchun [7 ,8 ,9 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Univ Arizona, Tucson, AZ 85721 USA
[3] Univ Arizona, Comp Sci & Commun, Tucson, AZ 85721 USA
[4] Univ Arizona, Comp Sci & Commun, MIS, Tucson, AZ 85721 USA
[5] Ctr Management Informat, Tucson, AZ USA
[6] Ctr Border Secur & Immigrat, Tucson, AZ USA
[7] Univ Arizona, Management Informat Syst, Tucson, AZ 85721 USA
[8] Univ Arizona, Management & Technol, Tucson, AZ 85721 USA
[9] Artificial Intelligence Lab, Tucson, AZ USA
基金
美国国家科学基金会;
关键词
community participation; cybercrime; cybercriminal community; Internet Relay Chat; participation duration modeling; SYSTEM; RISKS;
D O I
10.1080/07421222.2016.1205918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting interests, making it difficult to detect potential long-term or key participants. This is a challenge for researchers and practitioners to quickly identify cybercriminals that may provide credible threat intelligence. Thus, we propose a computational approach to analyze cybercriminals IRC communities in order to identify potential long-term and key participants. We use the extended Cox model to scrutinize cybercriminal IRC participation for better understanding of behaviors exhibited by cybercriminals of importance. Results indicate that key cybercriminals may be quickly identifiable by assessing the scale of their interaction and networks with other participants.
引用
收藏
页码:482 / 510
页数:29
相关论文
共 40 条
[1]  
Abbasi A., 2014, P IEEE JOINT INT SEC, P55
[2]  
Abbasi A, 2008, MIS QUART, V32, P811
[3]  
[Anonymous], 2001, Handbook of Econometrics
[4]  
[Anonymous], 2011, COMMUNICATION RES
[5]  
[Anonymous], 2012, P ACM 2012 C COMPUTE, DOI DOI 10.1145/2145204.2145329
[6]  
[Anonymous], 2011, Report of the National Science and Tehcnology Council, Executive Office of the President, P1
[7]  
Balahur A., 2010, PACIS 2010, V53, P742
[8]  
Benjamin Victor, 2012, Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics. Cyberspace, Border, and Immigration Securities (ISI 2012), P24, DOI 10.1109/ISI.2012.6283296
[9]   Time-to-event Modeling for Predicting Hacker IRC Community Participant Trajectory [J].
Benjamin, Victor ;
Chen, Hsinchun .
2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, :25-32
[10]   Statistics review 12: Survival analysis [J].
Bewick, V ;
Cheek, L ;
Ball, J .
CRITICAL CARE, 2004, 8 (05) :389-394