Abstract
Nowadays, cyberbullying cases are more common due to free access to technological resources. Studies related to this phenomenon from the fields of computer science and computer security are still limited. Several factors such as the access to specific databases on cyberbullying, the unification of scientific criteria that assess the nature of the problem, or the absence of real proposals that prevent and mitigate this problem could motivate the lack of interest by researchers in the field of information security to generate significant contributions. This research proposes a cyberbullying life cycle model through topic modeling and conceptualizes the different stages of the attack considering criteria associated with computer attacks. This proposal is supported by a review of the specific literature and knowledge bases gained from experiences of victims of online harassment and tweets from attackers.













Similar content being viewed by others
References
Margono H (2019) Analysis of the indonesian cyberbullying through data mining: the effective identification of cyberbullying through characteristics of messages. Ph.D. Thesis, Victoria University
Huber S, Wiemer H, Schneider D, Ihlenfeldt S (2019) Dmme: data mining methodology for engineering applications–a holistic extension to the crisp-dm model. Procedia CIRP 79:403–408
Aalsma MC, Brown JR (2008) What is bullying?. J Adolesc Health 43(2):101–102
Volk AA, Dane AV, Marini ZA (2014) What is bullying? A theoretical redefinition. Dev Rev 34(4):327–343
Al Mazari A (2013) Cyber-bullying taxonomies: definition, forms, consequences and mitigation strategies. In: 2013 5th International Conference on Computer Science and Information Technology, IEEE, pp 126–133
Zhong H, Miller DJ, Squicciarini A (2018) Flexible inference for cyberbully incident detection. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, pp 356–371
kaspersky (2020) Cyberbullying: The cybercrime of the century
Oweis NE, Alrababa MA, Oweis WG, Owais SS, Alansari M (2014) A survey of internet security risk over social networks. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT), IEEE, pp 1–4
Nahar V, Unankard S, Li X, Pang C (2012) Sentiment analysis for effective detection of cyber bullying. In: Asia-Pacific Web Conference, Springer, pp 767–774
Dhond V, Richter S, McKenna B (2018) Exploratory research to identify the characteristics of cyber victims on social media in new zealand. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, Springer, pp 193– 210
Jabeen F, Treur J (2018) Computational analysis of bullying behavior in the social media era. In: International Conference on Computational Collective Intelligence, Springer, pp 192–205
Sedano CR, Ursini EL, Martins PS (2017) A bullying-severity identifier framework based on machine learning and fuzzy logic. In: International Conference on Artificial Intelligence and Soft Computing, Springer, pp 315–324
Del Bosque LP, Garza SE (2014) Aggressive text detection for cyberbullying. In: Mexican International Conference on Artificial Intelligence, Springer, pp 221–232
Hosseinmardi H, Mattson SA, Rafiq RI, Han R, Lv Q, Mishra S (2015) Analyzing labeled cyberbullying incidents on the instagram social network. In: International conference on social informatics, Springer, pp 49–66
Dadvar M, Ordelman R, de Jong F, Trieschnigg D (2012) Towards user modelling in the combat against cyberbullying. In: International Conference on Application of Natural Language to Information Systems, Springer, pp 277–283
Dadvar M, Trieschnigg D, Ordelman R, de Jong F (2013) Improving cyberbullying detection with user context. In: European Conference on Information Retrieval, Springer, pp 693–696
Thawiworadilok C, Songhori MJ, Terano T (2015) Investigating Japanese Ijime (bullying) behavior using agent-based and system dynamics models. In: Australasian Joint Conference on Artificial Intelligence, Springer, pp 554–558
Potha N, Maragoudakis M (2015) Time series forecasting in cyberbullying data. In: International Conference on Engineering Applications of Neural Networks, Springer, pp 289–303
Liu J, Tao Y, Bai Q (2016) Towards exposing cyberstalkers in online social networks. In: Pacific Rim International Conference on Artificial Intelligence, Springer, pp 763–770
Al-Garadi MA, Hussain MR, Khan N, Murtaza G, Nweke HF, Ali I, Mujtaba G, Chiroma H, Khattak HA, Gani A (2019) Predicting cyberbullying on social media in the big data era using machine learning algorithms: review of literature and open challenges. IEEE Access 7:70701–70718
Ting I-H, Liou WS, Liberona D, Wang S-L, Bermudez GMT (2017) Towards the detection of cyberbullying based on social network mining techniques. In: 2017 International Conference on Behavioral, Economic, Socio-cultural Computing (BESC), IEEE, pp 1–2
Haidar B, Chamoun M, Serhrouchni A (2017) Multilingual cyberbullying detection system: detecting cyberbullying in arabic content. In: 2017 1st Cyber Security in Networking Conference (CSNet), IEEE, pp 1–8
Banerjee V, Telavane J, Gaikwad P, Vartak P (2019) Detection of cyberbullying using deep neural network. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), IEEE, pp 604–607
Upadhyay A, Chaudhari A, Ghale S, Pawar SS, et al (2017) Detection and prevention measures for cyberbullying and online grooming. In: 2017 International Conference on Inventive Systems and Control (ICISC), IEEE, pp 1–4
Parime S, Suri V (2014) Cyberbullying detection and prevention: data mining and psychological perspective. In: 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014], IEEE, pp 1541–1547
Eshan SC, Hasan MS (2017) An application of machine learning to detect abusive bengali text. In: 2017 20th International Conference of Computer and Information Technology (ICCIT), IEEE, pp 1–6
Al-Ajlan MA, Ykhlef M (2018) Optimized twitter cyberbullying detection based on deep learning. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), IEEE, pp 1–5
Mohan S, Valsaladevi I, Thampi SM (2019) ”think before you post”: A cognitive psychological approach for limiting bullying in social media. In: International Conference on Smart City and Informatization, Springer, pp 418–434
Isa SM, Ashianti L, et al. (2017) Cyberbullying classification using text mining. In: 2017 1st International Conference on Informatics and Computational Sciences (ICICoS), IEEE, pp 241–246
Dadvar M, Trieschnigg D, de Jong F (2014) Experts and machines against bullies: a hybrid approach to detect cyberbullies. In: Canadian Conference on Artificial Intelligence, Springer, pp 275–281
Wachs S, Schubarth W, Seidel A, Piskunova E (2018) Detecting and interfering in cyberbullying among young people (foundations and results of german case-study). In: International Conference on Digital Transformation and Global Society, Springer, pp 277–285
Won J, Seo D (2017) Relationship between self-disclosure and cyberbullying on snss. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, Springer, pp 154–172
Agrawal S, Awekar A (2018) Deep learning for detecting cyberbullying across multiple social media platforms. In: European Conference on Information Retrieval, Springer, pp 141–153
Dev H, Ali ME, Mahmud J, Sen T, Basak M, Paul R (2015) A real-time crowd-powered testbed for content assessment of potential social media posts. In: International Conference on Social Informatics, Springer, pp 136–152
Dani H, Li J, Liu H (2017) Sentiment informed cyberbullying detection in social media. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, pp 52–67
Sintaha M, Mostakim M (2018) An empirical study and analysis of the machine learning algorithms used in detecting cyberbullying in social media. In: 2018 21st International Conference of Computer and Information Technology (ICCIT), IEEE, pp 1–6
Tapia F, Aguinaga C, Luje R (2018) Detection of behavior patterns through social networks like twitter, using data mining techniques as a method to detect cyberbullying. In: 2018 7th International Conference On Software Process Improvement (CIMPS), IEEE, pp 111–118
Rakib TBA, Soon L-K (2018) Using the reddit corpus for cyberbully detection. In: Asian Conference on Intelligent Information and Database Systems, Springer, pp 180–189
Ptaszynski M, Masui F, Kimura Y, Rzepka R, Araki K (2015) Automatic extraction of harmful sentence patterns with application in cyberbullying detection. In: Language and Technology Conference, Springer, pp 349–362
Nahar V, Al-Maskari S, Li X, Pang C (2014) Semi-supervised learning for cyberbullying detection in social networks. In: Australasian Database Conference, Springer, pp 160–171
Del Bosque LP, Garza SE (2016) Prediction of aggressive comments in social media: an exploratory study. IEEE Lat Am Trans 14(7):3474–3480
Nadali S, Murad MAA, Sharef NM, Mustapha A, Shojaee S (2013) A review of cyberbullying detection: an overview. In: 2013 13th International Conference on Intellient Systems Design and Applications, IEEE, pp 325–330
Kovačević A (2014) Cyberbullying detection using web content mining. In: 2014 22nd Telecommunications Forum Telfor (TELFOR), IEEE, pp 939–942
Altay EV, Alatas B (2018) Detection of cyberbullying in social networks using machine learning methods. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), IEEE, pp 87–91
Özel SA, Saraç E, Akdemir S, Aksu H (2017) Detection of cyberbullying on social media messages in Turkish. In: 2017 International Conference on Computer Science and Engineering (UBMK), IEEE, pp 366–370
Mahlangu T, Tu C, Owolawi P (2018) A review of automated detection methods for cyberbullying. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), IEEE, pp 1–5
Chavan VS, Shylaja SS (2015) Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, pp 2354–2358
Romsaiyud W (2016) Expectation-maximization algorithm for topic modeling on big data streams. In: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE, pp 1–7
Sharma HK, Kshitiz K, et al (2018) Nlp and machine learning techniques for detecting insulting comments on social networking platforms. In: 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), IEEE, pp 265–272
Çürük E, Acı C, Eşsiz ES (2018) Performance analysis of artificial neural network based classifiers for cyberbullying detection. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), IEEE, pp 1–5
Sugandhi R, Pande A, Chawla S, Agrawal A, Bhagat H (2015) Methods for detection of cyberbullying: a survey. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), IEEE, pp 173–177
Bu S-J, Cho S-B (2018) A hybrid deep learning system of cnn and lrcn to detect cyberbullying from sns comments. In: International Conference on Hybrid Artificial Intelligence Systems, Springer, pp 561–572
Fazil M, Abulaish M (2018) A hybrid approach for detecting automated spammers in Twitter. IEEE Transactions on Information Forensics and Security 13(11):2707–2719
Çürük E, Acı C, Eşsiz ES (2018) The effects of attribute selection in artificial neural network based classifiers on cyberbullying detection. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), IEEE, pp 6–11
Andriansyah M, Akbar A, Ahwan A, Gilani NA, Nugraha AR, Sari RN, Senjaya R (2017) Cyberbullying comment classification on Indonesian selebgram using support vector machine method. In: 2017 Second International Conference on Informatics and Computing (ICIC), IEEE, pp 1–5
Gorro KD, Sabellano MJG, Gorro K, Maderazo C, Capao K (2018) Classification of cyberbullying in Facebook using selenium and svm. In: 2018 3rd International Conference on Computer and Communication Systems (ICCCS), IEEE, pp 183– 186
Yao M, Chelmis C, Zois D-S (2018) Cyberbullying detection on instagram with optimal online feature selection. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, pp 401– 408
Bourgonje P, Moreno-Schneider J, Srivastava A, Rehm G (2017) Automatic classification of abusive language and personal attacks in various forms of online communication. In: International Conference of the German Society for Computational Linguistics and Language Technology, Springer, Cham, pp 180–191
Obadimu A, Mead E, Hussain MN, Agarwal N (2019) Identifying toxicity within Youtube video comment. In: International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation, Springer, pp 214–223
Silva YN, Rich C, Hall D (2016) Bullyblocker: towards the identification of cyberbullying in social networking sites. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, pp 1377–1379
Mouheb D, Ismail R, Al Qaraghuli S, Al Aghbari Z, Kamel I (2018) Detection of offensive messages in arabic social media communications. In: 2018 International Conference on Innovations in Information Technology (IIT), IEEE, pp 24–29
Febriana T, Budiarto A (2019) Twitter dataset for hate speech and cyberbullying detection in indonesian language. In: 2019 International Conference on Information Management and Technology (ICIMTech), vol 1, IEEE, pp 379–382
Ali WNHW, Mohd M, Fauzi F (2018) Cyberbullying detection: an overview. In: 2018 Cyber Resilience Conference (CRC), IEEE, pp 1–3
Mouton F, Leenen L, Venter HS (2016) Social engineering attack examples, templates and scenarios. Computers and Security 59:186–209. https://doi.org/10.1016/j.cose.2016.03.004.
Nohlberg M, Kowalski S (2008) The cycle of deception: a model of social engineering attacks, defenses and victims. In: Second International Symposium on Human Aspects of Information Security and Assurance (HAISA 2008), Plymouth, UK, 8-9 July 2008, University of Plymouth, pp 1–11
Bakhshi T (2017) Social engineering: revisiting end-user awareness and susceptibility to classic attack vectors. In: Emerging Technologies (ICET), 2017 13th International Conference on, IEEE, pp 1–6
Mitnick KD, Simon W L, Wozniak S (2006) The art of deception: controlling the human element of security. 2002. Paperback ISBN 0-471-23712-4
Zambrano P, Torres J, Flores P (2019) How does grooming fit into social engineering?. In: Advances in computer communication and computational sciences. Springer, pp 629–639
Radack S (2011) Managing information security risk: organization, mission and information system view, National Institute of Standards and Technology
Kissel R (2011) Glossary of key information security terms. Diane Publishing
Chen P, Desmet L, Huygens C (2014) A study on advanced persistent threats. In: IFIP International Conference on Communications and Multimedia Security, Springer, pp 63–72
Messaoud Brahim ID, Guennoun K, Wahbi M, Sadik M (2016) Advanced persistent threat: new analysis driven by life cycle phases and their challenges. In: 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS), IEEE, pp 1–6
Alshamrani A, Myneni S, Chowdhary A, Huang D (2019) A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials 21(2):1851–1877
Shenwen L, Yingbo L, Xiongjie D (2015) Study and research of apt detection technology based on big data processing architecture. In: 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication, IEEE, pp 313–316
Ussath M, Jaeger D, Cheng F, Meinel C (2016) Advanced persistent threats: behind the scenes. In: 2016 Annual Conference on Information Science and Systems (CISS), IEEE, pp 181– 186
Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 1(1):80
Lee P-J, Hu Y-H, Chen K, Tarn JM, Cheng L-E (2018) Cyberbullying detection on social network services.. In: PACIS, p 61
Wang W, Barnaghi PM, Bargiela A (2009) Probabilistic topic models for learning terminological ontologies. IEEE Trans Knowl Data Eng 22(7):1028–1040
Daud A, Li J, Zhou L, Muhammad F (2010) Knowledge discovery through directed probabilistic topic models: a survey. Frontiers of computer science in China 4(2):280–301
Lu Y, Mei Q, Zhai C (2011) Investigating task performance of probabilistic topic models: an empirical study of PLSA and LDA. Inf Retr 14(2):178–203
Alghamdi R, Alfalqi K (2015) A survey of topic modeling in text mining. Int J Adv Comput Sci Appl (IJACSA) 6(1):147–153
Fast E, Chen B, Bernstein MS (2016) Empath: understanding topic signals in large-scale text. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp 4647–4657
Mouton F, Malan MM, Leenen L, Venter HS (2014) Social engineering attack framework. In: Information Security for South Africa (ISSA), 2014, IEEE, pp 1–9
Sharma A, Sharma R, Sharma VK, Shrivatava V (2014) Application of data mining–a survey paper. International Journal of Computer Science and Information Technologies 5(2):2023–2025
Sondwale PP (2015) Overview of predictive and descriptive data mining techniques. International Journal of Advanced Research in Computer Science and Software Engineering 5(4):262–265
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zambrano, P., Torres, J., Yánez, Á. et al. Understanding cyberbullying as an information security attack—life cycle modeling. Ann. Telecommun. 76, 235–253 (2021). https://doi.org/10.1007/s12243-020-00785-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-020-00785-0