Start Date
14-12-2012 12:00 AM
Description
The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.
Recommended Citation
Ooi, Kok Wei; Kim, Seung Hyun; Wang, Qiu-Hong; and Hui, Kai-Lung, "Do Hackers Seek Variety? An Empirical Analysis of Website Defacements" (2012). ICIS 2012 Proceedings. 28.
https://aisel.aisnet.org/icis2012/proceedings/ResearchInProgress/28
Do Hackers Seek Variety? An Empirical Analysis of Website Defacements
The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.