Using Machine Learning to Examine Cyberattack Motivations on Web Defacement Data

Author:

Banerjee Sudipta1,Swearingen Thomas1,Shillair Ruth1,Bauer Johannes M.1,Holt Thomas1,Ross Arun1

Affiliation:

1. Michigan State University, East Lansing, MI, USA

Abstract

Social scientists have long been interested in the motives of hackers, particularly financially motivated attackers. This article analyzes web defacements, a less studied and more public form of cyberattack, in which the content of a web page is deliberately substituted with unwanted text and graphics chosen by the perpetrator. These attacks use a variety of strategies and are performed for a variety of motives, including political and ideological goals. The proliferation of such attacks has resulted in vast amounts of data that open new opportunities for qualitative and quantitative analysis. This article explores the usefulness of machine learning techniques to better understand attacker strategies and motivations. To detect overall attack patterns, this analysis utilized a sample of 40,000 images posted on defaced websites analyzed through deep machine learning methods. The approach demonstrates the potential of machine learning approaches for the study of cyberattacks, but it also reveals the considerable challenges that need to be overcome.

Funder

U.S. Department of Homeland Security

Publisher

SAGE Publications

Subject

Law,Library and Information Sciences,Computer Science Applications,General Social Sciences

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict;Proceedings of the ACM Web Conference 2024;2024-05-13

2. Comparative Analysis of Deep Learning Models for Web Defacement Detection Based on Textual Context;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22

3. Assessing the correlates of cyberattacks against high-visibility institutions;Criminal Justice Studies;2023-07-03

4. Malicious URL Detection using Logistic Regression;2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS);2021-08-23

5. Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements;Computers in Human Behavior Reports;2021-08

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3