Examining the social networks of malware writers and hackers

Thomas J. Holt, Deborah Strumsky, Olga Smirnova, Max Kilger

Research output: Contribution to journalArticle

65 Citations (Scopus)

Abstract

A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action. The findings demonstrate that there are a limited number of highly skilled hackers relative to those with some knowledge of computers. Additionally, those hackers with substantive technical skills are centrally located within friendship networks and are the focus of greater attention overall. The impact of these findings for our understanding of computer hacking, and peer networks generally are considered in detail.

Original languageEnglish (US)
Pages (from-to)891-903
Number of pages13
JournalInternational Journal of Cyber Criminology
Volume6
Issue number1
StatePublished - Jan 1 2012
Externally publishedYes

Fingerprint

hacker
social network
writer
subculture
research focus
friendship
lack
community

Keywords

  • Computer hackers
  • Cyber crime
  • Geography of networks
  • Malicious software
  • Malware
  • Network analysis

ASJC Scopus subject areas

  • Law

Cite this

Examining the social networks of malware writers and hackers. / Holt, Thomas J.; Strumsky, Deborah; Smirnova, Olga; Kilger, Max.

In: International Journal of Cyber Criminology, Vol. 6, No. 1, 01.01.2012, p. 891-903.

Research output: Contribution to journalArticle

Holt, Thomas J. ; Strumsky, Deborah ; Smirnova, Olga ; Kilger, Max. / Examining the social networks of malware writers and hackers. In: International Journal of Cyber Criminology. 2012 ; Vol. 6, No. 1. pp. 891-903.
@article{7fc27ea30cd4447baa22d63edd4678a7,
title = "Examining the social networks of malware writers and hackers",
abstract = "A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action. The findings demonstrate that there are a limited number of highly skilled hackers relative to those with some knowledge of computers. Additionally, those hackers with substantive technical skills are centrally located within friendship networks and are the focus of greater attention overall. The impact of these findings for our understanding of computer hacking, and peer networks generally are considered in detail.",
keywords = "Computer hackers, Cyber crime, Geography of networks, Malicious software, Malware, Network analysis",
author = "Holt, {Thomas J.} and Deborah Strumsky and Olga Smirnova and Max Kilger",
year = "2012",
month = "1",
day = "1",
language = "English (US)",
volume = "6",
pages = "891--903",
journal = "International Journal of Cyber Criminology",
issn = "0974-2891",
publisher = "K. Jaishankar",
number = "1",

}

TY - JOUR

T1 - Examining the social networks of malware writers and hackers

AU - Holt, Thomas J.

AU - Strumsky, Deborah

AU - Smirnova, Olga

AU - Kilger, Max

PY - 2012/1/1

Y1 - 2012/1/1

N2 - A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action. The findings demonstrate that there are a limited number of highly skilled hackers relative to those with some knowledge of computers. Additionally, those hackers with substantive technical skills are centrally located within friendship networks and are the focus of greater attention overall. The impact of these findings for our understanding of computer hacking, and peer networks generally are considered in detail.

AB - A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. Our research focuses on the rarely studied subject of underground networks of computer hackers. Thus, this study explores the social networks of a group of Russian hackers using publicly accessible data to understand the nature of social relationships and the ways that they affect information sharing and action. The findings demonstrate that there are a limited number of highly skilled hackers relative to those with some knowledge of computers. Additionally, those hackers with substantive technical skills are centrally located within friendship networks and are the focus of greater attention overall. The impact of these findings for our understanding of computer hacking, and peer networks generally are considered in detail.

KW - Computer hackers

KW - Cyber crime

KW - Geography of networks

KW - Malicious software

KW - Malware

KW - Network analysis

UR - http://www.scopus.com/inward/record.url?scp=84867688873&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867688873&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84867688873

VL - 6

SP - 891

EP - 903

JO - International Journal of Cyber Criminology

JF - International Journal of Cyber Criminology

SN - 0974-2891

IS - 1

ER -