The World of Defacers: Looking Through the Lens of Their Activities on Twitter
Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9252879/ |
id |
doaj-72a35bdc3bde4011b76031328344b068 |
---|---|
record_format |
Article |
spelling |
doaj-72a35bdc3bde4011b76031328344b0682021-03-30T04:34:09ZengIEEEIEEE Access2169-35362020-01-01820413220414310.1109/ACCESS.2020.30370159252879The World of Defacers: Looking Through the Lens of Their Activities on TwitterCagri Burak Aslan0https://orcid.org/0000-0003-0507-3922Shujun Li1https://orcid.org/0000-0001-5628-7328Fatih V. Celebi2Hao Tian3STM Defense Technologies Engineering and Trade Inc., Ankara, TurkeySchool of Computing, University of Kent, Canterbury, U.K.Computer Engineering Department, Ankara Yildirim Beyazit University, Ankara, TurkeySchool of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, ChinaMany web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks.https://ieeexplore.ieee.org/document/9252879/Cyber attacksdefacersdefacementgraph-based analysishackinghackers |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Cagri Burak Aslan Shujun Li Fatih V. Celebi Hao Tian |
spellingShingle |
Cagri Burak Aslan Shujun Li Fatih V. Celebi Hao Tian The World of Defacers: Looking Through the Lens of Their Activities on Twitter IEEE Access Cyber attacks defacers defacement graph-based analysis hacking hackers |
author_facet |
Cagri Burak Aslan Shujun Li Fatih V. Celebi Hao Tian |
author_sort |
Cagri Burak Aslan |
title |
The World of Defacers: Looking Through the Lens of Their Activities on Twitter |
title_short |
The World of Defacers: Looking Through the Lens of Their Activities on Twitter |
title_full |
The World of Defacers: Looking Through the Lens of Their Activities on Twitter |
title_fullStr |
The World of Defacers: Looking Through the Lens of Their Activities on Twitter |
title_full_unstemmed |
The World of Defacers: Looking Through the Lens of Their Activities on Twitter |
title_sort |
world of defacers: looking through the lens of their activities on twitter |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks. |
topic |
Cyber attacks defacers defacement graph-based analysis hacking hackers |
url |
https://ieeexplore.ieee.org/document/9252879/ |
work_keys_str_mv |
AT cagriburakaslan theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT shujunli theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT fatihvcelebi theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT haotian theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT cagriburakaslan worldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT shujunli worldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT fatihvcelebi worldofdefacerslookingthroughthelensoftheiractivitiesontwitter AT haotian worldofdefacerslookingthroughthelensoftheiractivitiesontwitter |
_version_ |
1724181549133332480 |