Visible to the public Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks

TitleHackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks
Publication TypeConference Paper
Year of Publication2015
AuthorsRechavi, A., Berenblum, T., Maimon, D., Sevilla, I. S.
Conference Name2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Keywordsattacker behavior, BFA, brute force attacks, Computer crime, Computer hacking, computer networks, Computers, Cybercrime, cybersecurity, Cyberspace Policies, geographic position, Geography, hackers topology, Hacking, hacking network topology, hacking patterns, hacking spatial context, Honey-pots network, Hot-spots, Internet, IP networks, Network topology, pubcrawl170114, repeated system trespassing event network dynamics mapping, SNA, SNA technique, social network analysis technique, social networking (online), spatial attributes, system trespassers, topological positions, Topology, victimized computers
Abstract

This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions), and used Social Network Analysis (SNA) techniques, to depict and understand the correlation between spatial attributes (IP addresses) and hacking networks' topology. We mapped and explored hacking patterns and found that geography might set the behavior of the attackers as well as the topology of hacking networks. The contribution of this study stems from the fact that there are no prior studies of geographical influences on the topology of hacking networks and from the unique usage of SNA to investigate hacking activities. Looking ahead, our study can assist policymakers in forming effective policies in the field of cybercrime.

DOI10.1145/2808797.2808873
Citation Keyrechavi_hackers_2015