skip to main content
10.1145/3339252.3340341acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
short-paper

Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

Published:26 August 2019Publication History

ABSTRACT

In this paper, we propose the experimental construction of a new attacker typology grounded in real-life data, using grounded theory analysis and over 200 publicly available documents containing details of digital banking related cybercrime and involved attackers. The current state of this research area is introduced briefly, highlighting current issues and shortcomings. This is supported by a brief investigation into the mechanisms of the construction of previous taxonomies and typologies. Eight attacker profiles forming the typology specific to the case of digital banking are presented. A short discussion of contributions made and suggestions for future research directions in this field are also added.

References

  1. British Computer Society (BCS). 2010-2014. Cybercrime Forensics Specialist Group briefings. Compiled by Denis Edgar-Nevill (Canterbury Christ Church University), available via group distribution list. (2010-2014).Google ScholarGoogle Scholar
  2. Eric Chabrow. 2012. 7 Levels of hackers --- applying an ancient Chinese lesson: know your enemies. Retrieved March 30, 2019 from http://www.govinfosecurity.com/blogs.php?postID=1206. (25th of February 2012).Google ScholarGoogle Scholar
  3. Amanda Chandler. 1996. The changing definition and image of hackers in popular discourse. International Journal of the Sociology of Law 24, 2 (1996), 229--251.Google ScholarGoogle ScholarCross RefCross Ref
  4. Kathy Charmaz. 2014. Constructing Grounded Theory (2nd ed.). SAGE.Google ScholarGoogle Scholar
  5. Raoul Chiesa, Stefania Ducci, and Silvio Ciappi. 2008. Profiling Hackers --- The Science of Criminal Profiling as Applied to the World of Hacking. Auerbach Publications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. John W. Creswell. 2013. Research Design (International Student Edition): Qualitative, Quantitative, and Mixed Methods Approaches. SAGE.Google ScholarGoogle Scholar
  7. M. de Bruijne, M. van Eeten, C. H. Ganan, and W. Pieters. 2018. Towards a new cyber threat actor typology --- a hybrid method for the NCSC cyber security assessment. TU Delft. (2018).Google ScholarGoogle Scholar
  8. Federal Bureau of Investigation (FBI). 2018. Cyber's most wanted. Retrieved March 30, 2019 from https://www.fbi.gov/wanted/cyber. (2018).Google ScholarGoogle Scholar
  9. Sarah Gordon. 1996. The generic virus writer I+II. 6th International Virus Bulletin Conference, Brighton, UK (September 1996). Last retrieved from March 30, 2019 from https://www.virusbulletin.com/virusbulletin/2015/06/throwback-thursday-virus-writers-part-1-may-1999.Google ScholarGoogle Scholar
  10. Sara L.N. Hald and Jens M. Pedersen. 2012. An updated taxonomy for characterising hackers according to their threat properties. In 14th International Conference on Advanced Communication Technology (ICACT). 81--86.Google ScholarGoogle Scholar
  11. Richard C. Hollinger. 1988. Computer hackers follow a Guttman-like progression. Phrack Inc. 2, 22 (April 1988). Retrieved 30th March, 2019 from http://phrack.org/issues/22/7.html.Google ScholarGoogle Scholar
  12. Alice Hutchings. 2018. Cambridge Computer Crime Database. Retrieved March 30, 2019 from https://www.cl.cam.ac.uk/{~}ah793/cccd.html. (2018).Google ScholarGoogle Scholar
  13. Intel. 2007. Threat Agent Library helps identify information security risks (information technology white paper). Retrieved March 30, 2019 from https://www.sbs.ox.ac.uk. (2007).Google ScholarGoogle Scholar
  14. D. J. Ivoce. 1997. Collaring the cybercrook: An investigator's view. IEEE Spectrum 34, 6 (June 1997), 31--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Max Kilger, Ofir Arkin, and Jeff Sutzman. 2004. Know Your Enemy --- Learning About Security Threats. Addison-Wesley. 503--556 pages.Google ScholarGoogle Scholar
  16. William Landreth. 1989. Out of the Inner Circle: A Hacker's Guide to Computer Security. Microsoft Press.Google ScholarGoogle Scholar
  17. Larisa April Long and Egan Hadsell. 2012. Profiling hackers. Retrieved March 30, 2019 from http://www.sans.org/reading_room/whitepapers/hackers/profiling-hackers_33864. (January 2012).Google ScholarGoogle Scholar
  18. C. Meyers, S. Powers, and D. Faissol. 2009. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches. Technical Report. U.S. Department of Energy, Lawrence Livermore National Laboratory.Google ScholarGoogle Scholar
  19. Nick Nykodym, Robert Taylor, and Julia Vilela. 2005. Criminal profiling and insider cyber crime. Digital Investigation 2, 4 (2005), 261--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Tom Parker, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. 2004. Cyber Adversary Characterisation ---Auditing the Hacker Mind. Syngress, Rockland, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. P. Pfleeger and S. L. Pfleeger. 2006. Security in Computing. Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Borges Da Silva. 2013. Taxonomy and typology: are they really synonymous? Sante Publique 25, 5 (2013), 633--637.Google ScholarGoogle Scholar
  23. Marcus K. Rogers. 1999. A new hacker taxonomy. Retrieved March 30, 2019 from homes.cerias.purdue.edu/~mkr/hacker.doc. (1999).Google ScholarGoogle Scholar
  24. Marcus K. Rogers. 2006. A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation 3, 2 (2006), 97--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Ryan Seebruck. 2015. A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex modec. Digital Investigation 14 (2015), 36--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Zhengchuan Xu, Qing Hu, and Chenghong Zhang. 2013. Why computer talents become computer hackers. Communications of the ACM 56, 4 (April 2013), 64--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wolfgang Ziegler and Christian S. Fötinger. 2004. Understanding a hacker's mind --- a psychological insight into the hijacking of identities. Retrieved April 10, 2013 from http://www.donau-uni.ac.at/de/department/gpa/informatik/DanubeUniversityHackersStudy.pdf. (2004).Google ScholarGoogle Scholar

Index Terms

  1. Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
        August 2019
        979 pages
        ISBN:9781450371643
        DOI:10.1145/3339252

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 August 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate228of451submissions,51%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader