Do hackers seek variety? An empirical analysis of website defacements

Kok Wei Ooi, Seung Hyun Kim, Qiu Hong Wang, Kai Lung Hui

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.

Original languageEnglish
Title of host publicationInternational Conference on Information Systems, ICIS 2012
PublisherAIS/ICIS Administrative Office
Pages824-833
Number of pages10
ISBN (Print)9781627486040
Publication statusPublished - 2012 Jan 1
EventInternational Conference on Information Systems, ICIS 2012 - Orlando, FL, United States
Duration: 2012 Dec 162012 Dec 19

Publication series

NameInternational Conference on Information Systems, ICIS 2012
Volume1

Other

OtherInternational Conference on Information Systems, ICIS 2012
CountryUnited States
CityOrlando, FL
Period12/12/1612/12/19

Fingerprint

hacker
Empirical Analysis
Security of data
website
Websites
Attack
Operating Systems
Economics
Target
Information Security
criminality
virtual reality
Likely
Tend
Interval
Web sites
Empirical analysis
economics
experience

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Statistics, Probability and Uncertainty
  • Applied Mathematics
  • Library and Information Sciences

Cite this

Ooi, K. W., Kim, S. H., Wang, Q. H., & Hui, K. L. (2012). Do hackers seek variety? An empirical analysis of website defacements. In International Conference on Information Systems, ICIS 2012 (pp. 824-833). (International Conference on Information Systems, ICIS 2012; Vol. 1). AIS/ICIS Administrative Office.
Ooi, Kok Wei ; Kim, Seung Hyun ; Wang, Qiu Hong ; Hui, Kai Lung. / Do hackers seek variety? An empirical analysis of website defacements. International Conference on Information Systems, ICIS 2012. AIS/ICIS Administrative Office, 2012. pp. 824-833 (International Conference on Information Systems, ICIS 2012).
@inproceedings{8cfc6dbc1c274a7188928d30a03bd0b5,
title = "Do hackers seek variety? An empirical analysis of website defacements",
abstract = "The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.",
author = "Ooi, {Kok Wei} and Kim, {Seung Hyun} and Wang, {Qiu Hong} and Hui, {Kai Lung}",
year = "2012",
month = "1",
day = "1",
language = "English",
isbn = "9781627486040",
series = "International Conference on Information Systems, ICIS 2012",
publisher = "AIS/ICIS Administrative Office",
pages = "824--833",
booktitle = "International Conference on Information Systems, ICIS 2012",

}

Ooi, KW, Kim, SH, Wang, QH & Hui, KL 2012, Do hackers seek variety? An empirical analysis of website defacements. in International Conference on Information Systems, ICIS 2012. International Conference on Information Systems, ICIS 2012, vol. 1, AIS/ICIS Administrative Office, pp. 824-833, International Conference on Information Systems, ICIS 2012, Orlando, FL, United States, 12/12/16.

Do hackers seek variety? An empirical analysis of website defacements. / Ooi, Kok Wei; Kim, Seung Hyun; Wang, Qiu Hong; Hui, Kai Lung.

International Conference on Information Systems, ICIS 2012. AIS/ICIS Administrative Office, 2012. p. 824-833 (International Conference on Information Systems, ICIS 2012; Vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Do hackers seek variety? An empirical analysis of website defacements

AU - Ooi, Kok Wei

AU - Kim, Seung Hyun

AU - Wang, Qiu Hong

AU - Hui, Kai Lung

PY - 2012/1/1

Y1 - 2012/1/1

N2 - The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.

AB - The importance of securing the cyberspace is higher than ever along with the evolution of cyber attacks launched by hackers with malicious intention. However, there has been little research to understand the hackers who are the most important agents determining the landscape of information security. This paper investigates the behaviors of hackers using a longitudinal dataset of defacement attacks. Based on theories of economics of criminal behaviors and variety seeking, we find that hackers seek variety in choosing their victims in terms of region, hacking method, and the type of operating systems; as their prior experience is focused in terms of hacking methods, target regions or operating systems, they tend to launch more attacks using new hacking methods, or against targets in new regions or using new operating systems. Furthermore, hackers are more likely to seek variety as the time interval between the previous and the current attack becomes longer.

UR - http://www.scopus.com/inward/record.url?scp=84886482034&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84886482034&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9781627486040

T3 - International Conference on Information Systems, ICIS 2012

SP - 824

EP - 833

BT - International Conference on Information Systems, ICIS 2012

PB - AIS/ICIS Administrative Office

ER -

Ooi KW, Kim SH, Wang QH, Hui KL. Do hackers seek variety? An empirical analysis of website defacements. In International Conference on Information Systems, ICIS 2012. AIS/ICIS Administrative Office. 2012. p. 824-833. (International Conference on Information Systems, ICIS 2012).