ABSTRACT
In this paper, we propose the experimental construction of a new attacker typology grounded in real-life data, using grounded theory analysis and over 200 publicly available documents containing details of digital banking related cybercrime and involved attackers. The current state of this research area is introduced briefly, highlighting current issues and shortcomings. This is supported by a brief investigation into the mechanisms of the construction of previous taxonomies and typologies. Eight attacker profiles forming the typology specific to the case of digital banking are presented. A short discussion of contributions made and suggestions for future research directions in this field are also added.
- British Computer Society (BCS). 2010-2014. Cybercrime Forensics Specialist Group briefings. Compiled by Denis Edgar-Nevill (Canterbury Christ Church University), available via group distribution list. (2010-2014).Google Scholar
- Eric Chabrow. 2012. 7 Levels of hackers --- applying an ancient Chinese lesson: know your enemies. Retrieved March 30, 2019 from http://www.govinfosecurity.com/blogs.php?postID=1206. (25th of February 2012).Google Scholar
- Amanda Chandler. 1996. The changing definition and image of hackers in popular discourse. International Journal of the Sociology of Law 24, 2 (1996), 229--251.Google ScholarCross Ref
- Kathy Charmaz. 2014. Constructing Grounded Theory (2nd ed.). SAGE.Google Scholar
- Raoul Chiesa, Stefania Ducci, and Silvio Ciappi. 2008. Profiling Hackers --- The Science of Criminal Profiling as Applied to the World of Hacking. Auerbach Publications. Google ScholarDigital Library
- John W. Creswell. 2013. Research Design (International Student Edition): Qualitative, Quantitative, and Mixed Methods Approaches. SAGE.Google Scholar
- M. de Bruijne, M. van Eeten, C. H. Ganan, and W. Pieters. 2018. Towards a new cyber threat actor typology --- a hybrid method for the NCSC cyber security assessment. TU Delft. (2018).Google Scholar
- Federal Bureau of Investigation (FBI). 2018. Cyber's most wanted. Retrieved March 30, 2019 from https://www.fbi.gov/wanted/cyber. (2018).Google Scholar
- Sarah Gordon. 1996. The generic virus writer I+II. 6th International Virus Bulletin Conference, Brighton, UK (September 1996). Last retrieved from March 30, 2019 from https://www.virusbulletin.com/virusbulletin/2015/06/throwback-thursday-virus-writers-part-1-may-1999.Google Scholar
- Sara L.N. Hald and Jens M. Pedersen. 2012. An updated taxonomy for characterising hackers according to their threat properties. In 14th International Conference on Advanced Communication Technology (ICACT). 81--86.Google Scholar
- Richard C. Hollinger. 1988. Computer hackers follow a Guttman-like progression. Phrack Inc. 2, 22 (April 1988). Retrieved 30th March, 2019 from http://phrack.org/issues/22/7.html.Google Scholar
- Alice Hutchings. 2018. Cambridge Computer Crime Database. Retrieved March 30, 2019 from https://www.cl.cam.ac.uk/{~}ah793/cccd.html. (2018).Google Scholar
- Intel. 2007. Threat Agent Library helps identify information security risks (information technology white paper). Retrieved March 30, 2019 from https://www.sbs.ox.ac.uk. (2007).Google Scholar
- D. J. Ivoce. 1997. Collaring the cybercrook: An investigator's view. IEEE Spectrum 34, 6 (June 1997), 31--36. Google ScholarDigital Library
- Max Kilger, Ofir Arkin, and Jeff Sutzman. 2004. Know Your Enemy --- Learning About Security Threats. Addison-Wesley. 503--556 pages.Google Scholar
- William Landreth. 1989. Out of the Inner Circle: A Hacker's Guide to Computer Security. Microsoft Press.Google Scholar
- Larisa April Long and Egan Hadsell. 2012. Profiling hackers. Retrieved March 30, 2019 from http://www.sans.org/reading_room/whitepapers/hackers/profiling-hackers_33864. (January 2012).Google Scholar
- C. Meyers, S. Powers, and D. Faissol. 2009. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches. Technical Report. U.S. Department of Energy, Lawrence Livermore National Laboratory.Google Scholar
- Nick Nykodym, Robert Taylor, and Julia Vilela. 2005. Criminal profiling and insider cyber crime. Digital Investigation 2, 4 (2005), 261--267. Google ScholarDigital Library
- Tom Parker, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. 2004. Cyber Adversary Characterisation ---Auditing the Hacker Mind. Syngress, Rockland, MA. Google ScholarDigital Library
- C. P. Pfleeger and S. L. Pfleeger. 2006. Security in Computing. Prentice Hall. Google ScholarDigital Library
- R. Borges Da Silva. 2013. Taxonomy and typology: are they really synonymous? Sante Publique 25, 5 (2013), 633--637.Google Scholar
- Marcus K. Rogers. 1999. A new hacker taxonomy. Retrieved March 30, 2019 from homes.cerias.purdue.edu/~mkr/hacker.doc. (1999).Google Scholar
- Marcus K. Rogers. 2006. A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Investigation 3, 2 (2006), 97--102. Google ScholarDigital Library
- Ryan Seebruck. 2015. A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex modec. Digital Investigation 14 (2015), 36--45. Google ScholarDigital Library
- Zhengchuan Xu, Qing Hu, and Chenghong Zhang. 2013. Why computer talents become computer hackers. Communications of the ACM 56, 4 (April 2013), 64--74. Google ScholarDigital Library
- Wolfgang Ziegler and Christian S. Fötinger. 2004. Understanding a hacker's mind --- a psychological insight into the hijacking of identities. Retrieved April 10, 2013 from http://www.donau-uni.ac.at/de/department/gpa/informatik/DanubeUniversityHackersStudy.pdf. (2004).Google Scholar
Index Terms
- Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking
Recommendations
A typology of hackers
Cyber attacks continue to increase in frequency and variety, making cyber malfeasance a rising area of study and a major policy issue. Categorizing cyber attackers aids targeted organizations in efficiently directing resources to enhance security. ...
Building attacker personas in practice: a digital banking example
HCI '18: Proceedings of the 32nd International BCS Human Computer Interaction ConferenceIn this short paper, a framework for building attacker personas based on a 10-step process model borrowed from user-centred design is proposed and applied to digital banking. In line with conventional personas, attacker personas are archetypical ...
On Cyber Threats to Smart Digital Environments
ICSDE'18: Proceedings of the 2nd International Conference on Smart Digital EnvironmentCyber threats and attacks have significantly increased in complexity and quantity throughout this past year. In this paper, the top fifteen cyber threats and trends are articulated in detail to provide awareness throughout the community and raising ...
Comments