What's in a name? Using words' uniqueness to identify hackers in brute force attacks

Amit Rechavi, Tamar Berenblum

Research output: Contribution to journalArticlepeer-review

Abstract

Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this sharing? The study investigates whether hackers who perform bmte force attacks (BFAs) from different countries (different IPs) use a spatially based corpus of words for usemames and passwords. The study explores the usage of975,000 usemames (UNs) and passwords (PWs) in bmte force attacks on honeypot (HP) computers. The results suggest that hacker subgroups attacking from different countries use different combinations of UNs and PWs, while a few attacks coming from different IPs share the same corpus of words. This significant result can help in tracing the source of BFAs by identifying and analyzing the terms used in such attacks.

Original languageEnglish
Pages (from-to)361-382
Number of pages22
JournalInternational Journal of Cyber Criminology
Volume14
Issue number1
DOIs
StatePublished - 1 Jan 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2020 International Journal of Cyber Criminology.

Keywords

  • Brute force attacks (BFAs)
  • Hackers
  • Honeypot
  • Knowledge exchange
  • SNA

ASJC Scopus subject areas

  • Law

Fingerprint

Dive into the research topics of 'What's in a name? Using words' uniqueness to identify hackers in brute force attacks'. Together they form a unique fingerprint.

Cite this