publication . Article . 2020

What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks

Rechavi, Amit; Berenblum, Tamar;
Open Access
  • Published: 26 Apr 2020
Abstract
Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this sharing? The study investigates whether hackers who perform brute force attacks (BFAs) from different countries (different IPs) use a spatially based corpus of words for usernames and passwords. The study explores the usage of 975,000 usernames (UNs) and passwords (PWs) in brute force attacks on honeypot (HP) computers. The results suggest that hacker subgroups attacking from different countries use different combinations of UNs and PWs, while a few attacks coming from different IPs share the same corpus of words. This significant result can help in tracing the so...
Subjects
ACM Computing Classification System: ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Download fromView all 2 versions
Open Access
Zenodo
Article . 2020
Provider: Datacite
Open Access
Zenodo
Article . 2020
Provider: Datacite
Open Access
ZENODO
Article . 2020
Provider: ZENODO
Any information missing or wrong?Report an Issue