Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Title | Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Rechavi, A., Berenblum, T., Maimon, D., Sevilla, I. S. |
Conference Name | 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) |
Keywords | attacker behavior, BFA, brute force attacks, Computer crime, Computer hacking, computer networks, Computers, Cybercrime, cybersecurity, Cyberspace Policies, geographic position, Geography, hackers topology, Hacking, hacking network topology, hacking patterns, hacking spatial context, Honey-pots network, Hot-spots, Internet, IP networks, Network topology, pubcrawl170114, repeated system trespassing event network dynamics mapping, SNA, SNA technique, social network analysis technique, social networking (online), spatial attributes, system trespassers, topological positions, Topology, victimized computers |
Abstract | This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions), and used Social Network Analysis (SNA) techniques, to depict and understand the correlation between spatial attributes (IP addresses) and hacking networks' topology. We mapped and explored hacking patterns and found that geography might set the behavior of the attackers as well as the topology of hacking networks. The contribution of this study stems from the fact that there are no prior studies of geographical influences on the topology of hacking networks and from the unique usage of SNA to investigate hacking activities. Looking ahead, our study can assist policymakers in forming effective policies in the field of cybercrime. |
DOI | 10.1145/2808797.2808873 |
Citation Key | rechavi_hackers_2015 |
- SNA technique
- Honey-pots network
- Hot-spots
- internet
- IP networks
- network topology
- pubcrawl170114
- repeated system trespassing event network dynamics mapping
- SNA
- hacking spatial context
- social network analysis technique
- social networking (online)
- spatial attributes
- system trespassers
- topological positions
- Topology
- victimized computers
- attacker behavior
- hacking patterns
- hacking network topology
- Hacking
- hackers topology
- Geography
- geographic position
- Cyberspace Policies
- Cybersecurity
- Cybercrime
- Computers
- computer networks
- Computer hacking
- Computer crime
- brute force attacks
- BFA