2017 IEEE International Conference on Big Data (Big Data) 2017
DOI: 10.1109/bigdata.2017.8258513
|View full text |Cite
|
Sign up to set email alerts
|

On the relevance of social media platforms in predicting the volume and patterns of web defacement attacks

Abstract: 1-Social media platforms are commonly employed by law enforcement agencies for collecting Open Source Intelligence (OSNIT) on criminals, and assessing the risk they pose to the environment the live in. However, since no prior research has investigated the relationships between hackers' use of social media platforms and their likelihood to generate cyberattacks, this practice is less common among Information Technology Teams. Addressing this empirical gap, we draw on the social learning theory and estimate the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

2
16
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(21 citation statements)
references
References 30 publications
2
16
0
2
Order By: Relevance
“…Website defacement originated as a way for hackers to mock system administrators for poor security protocol, and as a way to generate their reputations as skilled hackers (Kilger 2011;Woo et al 2004). Today, website defacement is commonly used to protest social and political injustice around the globe, where hacktivists often rely on website defacement to spread their ideological messages to a wider audience (Maimon et al 2017;Fitri 2011). Although over one million websites were defaced in 2017 alone, the existing literature virtually ignores the correlates of victimization, focusing almost exclusively on the content of the defacements (Holt et al 2017;Zone-H 2018).…”
Section: Website Defacementmentioning
confidence: 99%
See 1 more Smart Citation
“…Website defacement originated as a way for hackers to mock system administrators for poor security protocol, and as a way to generate their reputations as skilled hackers (Kilger 2011;Woo et al 2004). Today, website defacement is commonly used to protest social and political injustice around the globe, where hacktivists often rely on website defacement to spread their ideological messages to a wider audience (Maimon et al 2017;Fitri 2011). Although over one million websites were defaced in 2017 alone, the existing literature virtually ignores the correlates of victimization, focusing almost exclusively on the content of the defacements (Holt et al 2017;Zone-H 2018).…”
Section: Website Defacementmentioning
confidence: 99%
“…1 Although over one million websites are defaced each year (Zone-H 2018), only a few criminological studies exist that have studied website defacement as a form of cybercrime (i.e. Holt et al 2017;Holt et al 2019;Maimon et al 2017).…”
Section: Introductionmentioning
confidence: 99%
“…These are potential 'unconventional' signals that may collectively present sufficient predictive power to forecast cyberattacks. Some recent works (Okutan et al 2017b;Maimon et al 2017;Babko-Malaya et al 2017;Sapienza et al 2017;Okutan et al 2018) provide preliminary analysis for the relevance of unconventional signals to forecast cyberattacks. However, extracting these signals from continuously growing big data in a meaningful way requires special treatment (L'Heureux et al 2017;Al-Jarrah et al 2015).…”
Section: Introductionmentioning
confidence: 99%
“…Деякі сигнали призначені для виявлення попередніх кроків у циклі кібератак, що не передбачає залучення фактичної мережевої інфраструктури [19]. Автори показали, що здатність прогнозування сигналів змінюється з часом залежно від типу атаки.…”
unclassified
“…Автори показали, що здатність прогнозування сигналів змінюється з часом залежно від типу атаки. Крім того, визначення суттєвих відставань автоматизується для відповідних сигналів, щоб включити систему прогнозування, яка має бути адаптивною до різноманітних та змінних характеристик нетрадиційних сигналів [19].…”
unclassified