Exploring key hackers and cybersecurity threats in Chinese hacker communities

Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

Abstract

Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationCybersecurity and Big Data, ISI 2016
EditorsWenji Mao, G. Alan Wang, Lina Zhou, Lisa Kaati
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages13-18
Number of pages6
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Publication series

NameIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
Country/TerritoryUnited States
CityTucson
Period9/28/169/30/16

Keywords

  • Chinese hacker community
  • cybersecurity
  • key hacker
  • topic evolution
  • topic modeling

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Exploring key hackers and cybersecurity threats in Chinese hacker communities'. Together they form a unique fingerprint.

Cite this