Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities
نویسندگان
چکیده
To further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting interests, making it difficult to detect potential long-term or key participants. This is a challenge for researchers and practitioners to quickly identify cybercriminals that may provide credible threat intelligence. Thus, we propose a computational approach to analyze cybercriminals IRC communities in order to identify potential long-term and key participants. We use the extended Cox model to scrutinize cybercriminal IRC participation for better understanding of behaviors exhibited by cybercriminals of importance. Results indicate that key cybercriminals may be quickly identifiable by assessing the scale of their interaction and networks with other participants.
منابع مشابه
(Dis)agreements in Iranians’ Internet Relay Chats
The present study on politeness is an attempt to examine (dis)agreeing strategies utilized by EFL learners while chatting on the internet. Subjects of the study were forty male and thirty-three female Iranian natives whose internet relay chat (IRC) interactions, composed of 400 excerpts, were collected between December 2007 and September 2008. Data analysis was based on the general taxonomy of ...
متن کاملThe Flow of Knowledge in Free and Open Source Communities
In this paper we present a survey of the methods used by a selection of successful free andopen source projects to exchange, store and retrieve knowledge. In particular, we look into mailing lists, Internet Relay Chat, conferences, and code reviews. We explore how historical records left during the development become stored knowledge that can be subsequently retrieved. We also discuss the exist...
متن کاملTowards Investigating Substructures and Role Recognition in Goal Oriented Online Communities
In this paper, we apply social network analytic methods to unveil the structural dynamics of a popular open source goal oriented IRC community, Ubuntu. The primary objective is to track the development of this ever growing community over time using a social network lens and examine the dynamically changing participation patterns of people. Specifically, our research seeks out to investigate ans...
متن کاملExploring Key Hackers and Cyber Threats in Chinese Hacker Communities
Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key...
متن کاملDeveloping the IBM i Virtual community: iSociety
Internet-based virtual communities have become an important mode of communication among people all over the world (Eschenbrenner et al., 2008). Scott and Johnson (2005) found that some of the most heavily visited sites on the World Wide Web are either fully or in part online communities. These communities allow groups of people to utilize many to many interactions as a mode for sharing experien...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. of Management Information Systems
دوره 33 شماره
صفحات -
تاریخ انتشار 2016