Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks

Amit Rechavi, Tamar Berenblum, David Maimon, Ido Sivan Sevilla

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions), and used Social Network Analysis (SNA) techniques, to depict and understand the correlation between spatial attributes (IP addresses) and hacking networks' topology. We mapped and explored hacking patterns and found that geography might set the behavior of the attackers as well as the topology of hacking networks. The contribution of this study stems from the fact that there are no prior studies of geographical influences on the topology of hacking networks and from the unique usage of SNA to investigate hacking activities. Looking ahead, our study can assist policymakers in forming effective policies in the field of cybercrime.

Original languageEnglish
Title of host publicationProceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015
EditorsJian Pei, Jie Tang, Fabrizio Silvestri
PublisherAssociation for Computing Machinery, Inc
Pages795-804
Number of pages10
ISBN (Electronic)9781450338547
DOIs
StatePublished - 25 Aug 2015
EventIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015 - Paris, France
Duration: 25 Aug 201528 Aug 2015

Publication series

NameProceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015

Conference

ConferenceIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015
Country/TerritoryFrance
CityParis
Period25/08/1528/08/15

Keywords

  • Cybersecurity
  • Cyberspace policies
  • Hacking
  • Hot-spots
  • SNA
  • Topology

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks'. Together they form a unique fingerprint.

Cite this