Time-to-event modeling for predicting hacker IRC community participant trajectory

Victor Benjamin, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated to advance current cybersecurity capabilities. In particular, research on the human element behind cybercrime would offer new knowledge on securing cyberspace against those with malicious intent. Past work documents the existence of many hacker communities with participants sharing various cybercriminal assets and knowledge. However, participants vary in expertise, with some possessing only passing curiosity while others are capable cybercriminals. Here we develop a time-to-event based approach for assessing the relationship between various participation behaviors and participation length among hacker Internet Relay Chat (IRC) community participants. Using both the Kaplan-Meier model and Cox's model, we are able to develop predictions on individuals' participation trajectorybased on a series of message content and social network features. Results indicate that participation volume, discussion of pertinent topics, and social interconnectedness are all important at varying levels for identifying participants within hacker communities that have potential to become adept cybercriminals.

Original languageEnglish (US)
Title of host publicationProceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages25-32
Number of pages8
ISBN (Electronic)9781479963645
DOIs
StatePublished - Dec 4 2014
Event2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014 - The Hague, Netherlands
Duration: Sep 24 2014Sep 26 2014

Other

Other2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014
CountryNetherlands
CityThe Hague
Period9/24/149/26/14

Fingerprint

Trajectories
Internet
Communication

Keywords

  • Cybersecurity
  • Hacker community
  • Hacker IRC
  • Survival Analysis
  • Time-to-event

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Software

Cite this

Benjamin, V., & Chen, H. (2014). Time-to-event modeling for predicting hacker IRC community participant trajectory. In Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014 (pp. 25-32). [6975550] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/JISIC.2014.14

Time-to-event modeling for predicting hacker IRC community participant trajectory. / Benjamin, Victor; Chen, Hsinchun.

Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 25-32 6975550.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benjamin, V & Chen, H 2014, Time-to-event modeling for predicting hacker IRC community participant trajectory. in Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014., 6975550, Institute of Electrical and Electronics Engineers Inc., pp. 25-32, 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, Netherlands, 9/24/14. https://doi.org/10.1109/JISIC.2014.14
Benjamin V, Chen H. Time-to-event modeling for predicting hacker IRC community participant trajectory. In Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 25-32. 6975550 https://doi.org/10.1109/JISIC.2014.14
Benjamin, Victor ; Chen, Hsinchun. / Time-to-event modeling for predicting hacker IRC community participant trajectory. Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 25-32
@inproceedings{2b31d59ae54e4a6e9352896326d70c5f,
title = "Time-to-event modeling for predicting hacker IRC community participant trajectory",
abstract = "As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated to advance current cybersecurity capabilities. In particular, research on the human element behind cybercrime would offer new knowledge on securing cyberspace against those with malicious intent. Past work documents the existence of many hacker communities with participants sharing various cybercriminal assets and knowledge. However, participants vary in expertise, with some possessing only passing curiosity while others are capable cybercriminals. Here we develop a time-to-event based approach for assessing the relationship between various participation behaviors and participation length among hacker Internet Relay Chat (IRC) community participants. Using both the Kaplan-Meier model and Cox's model, we are able to develop predictions on individuals' participation trajectorybased on a series of message content and social network features. Results indicate that participation volume, discussion of pertinent topics, and social interconnectedness are all important at varying levels for identifying participants within hacker communities that have potential to become adept cybercriminals.",
keywords = "Cybersecurity, Hacker community, Hacker IRC, Survival Analysis, Time-to-event",
author = "Victor Benjamin and Hsinchun Chen",
year = "2014",
month = "12",
day = "4",
doi = "10.1109/JISIC.2014.14",
language = "English (US)",
pages = "25--32",
booktitle = "Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Time-to-event modeling for predicting hacker IRC community participant trajectory

AU - Benjamin, Victor

AU - Chen, Hsinchun

PY - 2014/12/4

Y1 - 2014/12/4

N2 - As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated to advance current cybersecurity capabilities. In particular, research on the human element behind cybercrime would offer new knowledge on securing cyberspace against those with malicious intent. Past work documents the existence of many hacker communities with participants sharing various cybercriminal assets and knowledge. However, participants vary in expertise, with some possessing only passing curiosity while others are capable cybercriminals. Here we develop a time-to-event based approach for assessing the relationship between various participation behaviors and participation length among hacker Internet Relay Chat (IRC) community participants. Using both the Kaplan-Meier model and Cox's model, we are able to develop predictions on individuals' participation trajectorybased on a series of message content and social network features. Results indicate that participation volume, discussion of pertinent topics, and social interconnectedness are all important at varying levels for identifying participants within hacker communities that have potential to become adept cybercriminals.

AB - As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated to advance current cybersecurity capabilities. In particular, research on the human element behind cybercrime would offer new knowledge on securing cyberspace against those with malicious intent. Past work documents the existence of many hacker communities with participants sharing various cybercriminal assets and knowledge. However, participants vary in expertise, with some possessing only passing curiosity while others are capable cybercriminals. Here we develop a time-to-event based approach for assessing the relationship between various participation behaviors and participation length among hacker Internet Relay Chat (IRC) community participants. Using both the Kaplan-Meier model and Cox's model, we are able to develop predictions on individuals' participation trajectorybased on a series of message content and social network features. Results indicate that participation volume, discussion of pertinent topics, and social interconnectedness are all important at varying levels for identifying participants within hacker communities that have potential to become adept cybercriminals.

KW - Cybersecurity

KW - Hacker community

KW - Hacker IRC

KW - Survival Analysis

KW - Time-to-event

UR - http://www.scopus.com/inward/record.url?scp=84920270940&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84920270940&partnerID=8YFLogxK

U2 - 10.1109/JISIC.2014.14

DO - 10.1109/JISIC.2014.14

M3 - Conference contribution

AN - SCOPUS:84920270940

SP - 25

EP - 32

BT - Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -