Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics

Overview

Cyber security is an important challenge in today's world as corporations, governments, and individuals have increasingly become victims of cyber-attacks. Such attacks exploit weaknesses in technical infrastructures and human behavior. Understanding the motivation and incentives of individuals and institutions, both as attackers and defenders, can aid in creating a more secure and trustworthy cyberspace. Instead of taking a reactive approach to infrastructure protection and damage control, proactive cyber security attribution and situational awareness of the sources of attacks will allow researchers and practitioners to better understand the community of cyber attackers (and the closely affiliated hacker community), their profiles and incentives, and the associated vast underground cyber-criminal networks and ecosystems. Developing “methods to model adversaries” is one of the critical but unfulfilled research needs recommended in the “Trustworthy Cyberspace” report by the National Science and Technology Council (2011). Our research team will address important social science research questions of relevance to cyber attacker or hacker skills, community structure and ecosystem, contents and artifacts, and cultural differences. We will develop automated hacker forums and IRC (Internet Relay Chat) collection techniques for the international (US, Russian and Chinese) hacker communities. We will also deploy scalable honeypot platforms to collect malware in the wild and generate feature representation for malware attribution. The proposed integrated computational framework and the resulting algorithms and software will allow social science researchers and security practitioners to: (1) detect, classify, measure and track the formation, development and spread of topics, ideas, and concepts in cyber attacker social media communication; (2) identify important and influential cyber criminals and their interests, intent, sentiment, and opinions in online discourses; and (3) induce and recognize hacker identities, online profiles/styles, communication genres, and interaction patterns.

top 

People


Karan Chadha
email:
website: http://acl.ece.arizona.edu


Youssif Al-Nashif
email:
website: http://www.ece.arizona.edu/~alnashif

top 


Sponsors

 

 

 
Phone Number: (520) 621-9915 Room 251, ECE Dept. 1230 E. Speedway Tucson, AZ 85721-0104
ACL - © Copyright 2007, Webmaster: Youssif Al-Nashif
All Rights Reserved