【24h】

Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks

机译:黑客拓扑问题的地理分布:映射重复的系统侵入事件网络的动态

获取原文

摘要

This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions), and used Social Network Analysis (SNA) techniques, to depict and understand the correlation between spatial attributes (IP addresses) and hacking networks' topology. We mapped and explored hacking patterns and found that geography might set the behavior of the attackers as well as the topology of hacking networks. The contribution of this study stems from the fact that there are no prior studies of geographical influences on the topology of hacking networks and from the unique usage of SNA to investigate hacking activities. Looking ahead, our study can assist policymakers in forming effective policies in the field of cybercrime.
机译:这项研究的重点是黑客入侵蜜罐网络的空间背景。我们调查拓扑位置和受害计算机和系统侵入者的地理位置之间的关系。我们已经在两个学术机构的计算机网络上部署了研究蜜罐,收集了有关成功的暴力攻击(BFA)和系统侵入事件(会话)的信息,并使用了社交网络分析(SNA)技术来描述和理解空间属性(IP地址)和黑客网络的拓扑。我们绘制并探索了黑客攻击模式,发现地理位置可能会设置攻击者的行为以及黑客网络的拓扑。这项研究的贡献源于以下事实:以前没有关于黑客网络拓扑的地理影响的研究,也没有利用SNA来调查黑客活动的独特用法。展望未来,我们的研究可以帮助政策制定者制定网络犯罪领域的有效政策。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号