The World of Defacers: Looking Through the Lens of Their Activities on Twitter

Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data...

Full description

Bibliographic Details
Main Authors: Cagri Burak Aslan, Shujun Li, Fatih V. Celebi, Hao Tian
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9252879/
id doaj-72a35bdc3bde4011b76031328344b068
record_format Article
spelling doaj-72a35bdc3bde4011b76031328344b0682021-03-30T04:34:09ZengIEEEIEEE Access2169-35362020-01-01820413220414310.1109/ACCESS.2020.30370159252879The World of Defacers: Looking Through the Lens of Their Activities on TwitterCagri Burak Aslan0https://orcid.org/0000-0003-0507-3922Shujun Li1https://orcid.org/0000-0001-5628-7328Fatih V. Celebi2Hao Tian3STM Defense Technologies Engineering and Trade Inc., Ankara, TurkeySchool of Computing, University of Kent, Canterbury, U.K.Computer Engineering Department, Ankara Yildirim Beyazit University, Ankara, TurkeySchool of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, ChinaMany web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks.https://ieeexplore.ieee.org/document/9252879/Cyber attacksdefacersdefacementgraph-based analysishackinghackers
collection DOAJ
language English
format Article
sources DOAJ
author Cagri Burak Aslan
Shujun Li
Fatih V. Celebi
Hao Tian
spellingShingle Cagri Burak Aslan
Shujun Li
Fatih V. Celebi
Hao Tian
The World of Defacers: Looking Through the Lens of Their Activities on Twitter
IEEE Access
Cyber attacks
defacers
defacement
graph-based analysis
hacking
hackers
author_facet Cagri Burak Aslan
Shujun Li
Fatih V. Celebi
Hao Tian
author_sort Cagri Burak Aslan
title The World of Defacers: Looking Through the Lens of Their Activities on Twitter
title_short The World of Defacers: Looking Through the Lens of Their Activities on Twitter
title_full The World of Defacers: Looking Through the Lens of Their Activities on Twitter
title_fullStr The World of Defacers: Looking Through the Lens of Their Activities on Twitter
title_full_unstemmed The World of Defacers: Looking Through the Lens of Their Activities on Twitter
title_sort world of defacers: looking through the lens of their activities on twitter
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Many web-based attacks have been studied to understand how web hackers behave, but web site defacement attacks (malicious content manipulations of victim web sites) and defacers' behaviors have received less attention from researchers. This paper fills this research gap via a computational data-driven analysis of a public database of defacers and defacement attacks and activities of 96 selected defacers who were active on Twitter. We conducted a comprehensive analysis of the data: an analysis of a friendship graph with 10,360 nodes, an analysis on how sentiments of defacers related to attack patterns, and a topical modelling based analysis to study what defacers discussed publicly on Twitter. Our analysis revealed a number of key findings: a modular and hierarchical clustering method can help discover interesting sub-communities of defacers; sentiment analysis can help categorize behaviors of defacers in terms of attack patterns; and topic modelling revealed some focus topics (politics, country-specific topics, and technical discussions) among defacers on Twitter and also geographic links of defacers sharing similar topics. We believe that these findings are useful for a better understanding of defacers' behaviors, which could help design and development of better solutions for detecting defacers and even preventing impeding defacement attacks.
topic Cyber attacks
defacers
defacement
graph-based analysis
hacking
hackers
url https://ieeexplore.ieee.org/document/9252879/
work_keys_str_mv AT cagriburakaslan theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT shujunli theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT fatihvcelebi theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT haotian theworldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT cagriburakaslan worldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT shujunli worldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT fatihvcelebi worldofdefacerslookingthroughthelensoftheiractivitiesontwitter
AT haotian worldofdefacerslookingthroughthelensoftheiractivitiesontwitter
_version_ 1724181549133332480