Using social network analysis to identify key hackers for keylogging tools in hacker forums

Sagar Samtani, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Cyber-Attacks are critical cybersecurity concerns across the world. Catching malicious hackers prior to a cyber-Attack can save significant financial cost as well as avoid devastating cyber-Attacks. Current methods of identifying and reprimanding hackers generally occurs after an attack and is reactive in nature. This research aims to proactively identify key hackers who are creating and disseminating malicious tools within hacker forums. Specifically, we utilize social network analysis techniques to systematically identify key hackers for keylogging tools within a large English hacker forum. Results of this study indicate that many key hackers are the most senior, longest tenured participants of their community.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages319-321
Number of pages3
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
CountryUnited States
CityTucson
Period9/28/169/30/16

Fingerprint

Electric network analysis
Costs
Social network analysis
Attack

Keywords

  • hacker forums
  • keylogging
  • social network analysis

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Cite this

Samtani, S., & Chen, H. (2016). Using social network analysis to identify key hackers for keylogging tools in hacker forums. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016 (pp. 319-321). [7745500] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISI.2016.7745500

Using social network analysis to identify key hackers for keylogging tools in hacker forums. / Samtani, Sagar; Chen, Hsinchun.

IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 319-321 7745500.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Samtani, S & Chen, H 2016, Using social network analysis to identify key hackers for keylogging tools in hacker forums. in IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016., 7745500, Institute of Electrical and Electronics Engineers Inc., pp. 319-321, 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Tucson, United States, 9/28/16. https://doi.org/10.1109/ISI.2016.7745500
Samtani S, Chen H. Using social network analysis to identify key hackers for keylogging tools in hacker forums. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 319-321. 7745500 https://doi.org/10.1109/ISI.2016.7745500
Samtani, Sagar ; Chen, Hsinchun. / Using social network analysis to identify key hackers for keylogging tools in hacker forums. IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 319-321
@inproceedings{52e1ed64bff3418cab1be9c1a1c8dd1f,
title = "Using social network analysis to identify key hackers for keylogging tools in hacker forums",
abstract = "Cyber-Attacks are critical cybersecurity concerns across the world. Catching malicious hackers prior to a cyber-Attack can save significant financial cost as well as avoid devastating cyber-Attacks. Current methods of identifying and reprimanding hackers generally occurs after an attack and is reactive in nature. This research aims to proactively identify key hackers who are creating and disseminating malicious tools within hacker forums. Specifically, we utilize social network analysis techniques to systematically identify key hackers for keylogging tools within a large English hacker forum. Results of this study indicate that many key hackers are the most senior, longest tenured participants of their community.",
keywords = "hacker forums, keylogging, social network analysis",
author = "Sagar Samtani and Hsinchun Chen",
year = "2016",
month = "11",
day = "15",
doi = "10.1109/ISI.2016.7745500",
language = "English (US)",
pages = "319--321",
booktitle = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Using social network analysis to identify key hackers for keylogging tools in hacker forums

AU - Samtani, Sagar

AU - Chen, Hsinchun

PY - 2016/11/15

Y1 - 2016/11/15

N2 - Cyber-Attacks are critical cybersecurity concerns across the world. Catching malicious hackers prior to a cyber-Attack can save significant financial cost as well as avoid devastating cyber-Attacks. Current methods of identifying and reprimanding hackers generally occurs after an attack and is reactive in nature. This research aims to proactively identify key hackers who are creating and disseminating malicious tools within hacker forums. Specifically, we utilize social network analysis techniques to systematically identify key hackers for keylogging tools within a large English hacker forum. Results of this study indicate that many key hackers are the most senior, longest tenured participants of their community.

AB - Cyber-Attacks are critical cybersecurity concerns across the world. Catching malicious hackers prior to a cyber-Attack can save significant financial cost as well as avoid devastating cyber-Attacks. Current methods of identifying and reprimanding hackers generally occurs after an attack and is reactive in nature. This research aims to proactively identify key hackers who are creating and disseminating malicious tools within hacker forums. Specifically, we utilize social network analysis techniques to systematically identify key hackers for keylogging tools within a large English hacker forum. Results of this study indicate that many key hackers are the most senior, longest tenured participants of their community.

KW - hacker forums

KW - keylogging

KW - social network analysis

UR - http://www.scopus.com/inward/record.url?scp=85003955443&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85003955443&partnerID=8YFLogxK

U2 - 10.1109/ISI.2016.7745500

DO - 10.1109/ISI.2016.7745500

M3 - Conference contribution

AN - SCOPUS:85003955443

SP - 319

EP - 321

BT - IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -