Journal article Open Access

What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks

Amit Rechavi; Tamar Berenblum


Citation Style Language JSON Export

{
  "publisher": "Zenodo", 
  "DOI": "10.5281/zenodo.3766652", 
  "author": [
    {
      "family": "Amit Rechavi"
    }, 
    {
      "family": "Tamar Berenblum"
    }
  ], 
  "issued": {
    "date-parts": [
      [
        2020, 
        4, 
        26
      ]
    ]
  }, 
  "abstract": "<p><em>Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this sharing? The study investigates whether hackers who perform brute force attacks (BFAs) from different countries (different IPs) use a spatially based corpus of words for usernames and passwords. The study explores the usage of 975,000 usernames (UNs) and passwords (PWs) in brute force attacks on honeypot (HP) computers. The results suggest that hacker subgroups attacking from different countries use different combinations of UNs and PWs, while a few attacks coming from different IPs share the same corpus of words. This significant result can help in tracing the source of BFAs by identifying and analyzing the terms used in such attacks.</em></p>", 
  "title": "What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks", 
  "type": "article-journal", 
  "id": "3766652"
}
112
24
views
downloads
All versions This version
Views 112112
Downloads 2424
Data volume 296.9 MB296.9 MB
Unique views 111111
Unique downloads 2020

Share

Cite as