What's in a name? Using words' uniqueness to identify hackers in brute force attacks

Amit Rechavi, Tamar Berenblum

Research output: Contribution to journalArticlepeer-review

Abstract

Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this sharing? The study investigates whether hackers who perform bmte force attacks (BFAs) from different countries (different IPs) use a spatially based corpus of words for usemames and passwords. The study explores the usage of975,000 usemames (UNs) and passwords (PWs) in bmte force attacks on honeypot (HP) computers. The results suggest that hacker subgroups attacking from different countries use different combinations of UNs and PWs, while a few attacks coming from different IPs share the same corpus of words. This significant result can help in tracing the source of BFAs by identifying and analyzing the terms used in such attacks.

Original languageEnglish
Pages (from-to)361-382
Number of pages22
JournalInternational Journal of Cyber Criminology
Volume14
Issue number1
DOIs
StatePublished - 1 Jan 2020
Externally publishedYes

Keywords

  • Brute force attacks (BFAs)
  • Hackers
  • Honeypot
  • Knowledge exchange
  • SNA

Fingerprint

Dive into the research topics of 'What's in a name? Using words' uniqueness to identify hackers in brute force attacks'. Together they form a unique fingerprint.

Cite this