Exploring key hackers and cybersecurity threats in Chinese hacker communities

Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages13-18
Number of pages6
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
CountryUnited States
CityTucson
Period9/28/169/30/16

Fingerprint

Threat
Topic model
Fraud
Language
Communication channels

Keywords

  • Chinese hacker community
  • cybersecurity
  • key hacker
  • topic evolution
  • topic modeling

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Cite this

Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., ... Chen, H. (2016). Exploring key hackers and cybersecurity threats in Chinese hacker communities. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016 (pp. 13-18). [7745436] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISI.2016.7745436

Exploring key hackers and cybersecurity threats in Chinese hacker communities. / Fang, Zhen; Zhao, Xinyi; Wei, Qiang; Chen, Guoqing; Zhang, Yong; Xing, Chunxiao; Li, Weifeng; Chen, Hsinchun.

IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 13-18 7745436.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fang, Z, Zhao, X, Wei, Q, Chen, G, Zhang, Y, Xing, C, Li, W & Chen, H 2016, Exploring key hackers and cybersecurity threats in Chinese hacker communities. in IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016., 7745436, Institute of Electrical and Electronics Engineers Inc., pp. 13-18, 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Tucson, United States, 9/28/16. https://doi.org/10.1109/ISI.2016.7745436
Fang Z, Zhao X, Wei Q, Chen G, Zhang Y, Xing C et al. Exploring key hackers and cybersecurity threats in Chinese hacker communities. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 13-18. 7745436 https://doi.org/10.1109/ISI.2016.7745436
Fang, Zhen ; Zhao, Xinyi ; Wei, Qiang ; Chen, Guoqing ; Zhang, Yong ; Xing, Chunxiao ; Li, Weifeng ; Chen, Hsinchun. / Exploring key hackers and cybersecurity threats in Chinese hacker communities. IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 13-18
@inproceedings{a1c64d942647463a896c7ab237700845,
title = "Exploring key hackers and cybersecurity threats in Chinese hacker communities",
abstract = "Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.",
keywords = "Chinese hacker community, cybersecurity, key hacker, topic evolution, topic modeling",
author = "Zhen Fang and Xinyi Zhao and Qiang Wei and Guoqing Chen and Yong Zhang and Chunxiao Xing and Weifeng Li and Hsinchun Chen",
year = "2016",
month = "11",
day = "15",
doi = "10.1109/ISI.2016.7745436",
language = "English (US)",
pages = "13--18",
booktitle = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Exploring key hackers and cybersecurity threats in Chinese hacker communities

AU - Fang, Zhen

AU - Zhao, Xinyi

AU - Wei, Qiang

AU - Chen, Guoqing

AU - Zhang, Yong

AU - Xing, Chunxiao

AU - Li, Weifeng

AU - Chen, Hsinchun

PY - 2016/11/15

Y1 - 2016/11/15

N2 - Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.

AB - Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.

KW - Chinese hacker community

KW - cybersecurity

KW - key hacker

KW - topic evolution

KW - topic modeling

UR - http://www.scopus.com/inward/record.url?scp=85003977001&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85003977001&partnerID=8YFLogxK

U2 - 10.1109/ISI.2016.7745436

DO - 10.1109/ISI.2016.7745436

M3 - Conference contribution

SP - 13

EP - 18

BT - IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -