TY - GEN
T1 - Exploring key hackers and cybersecurity threats in Chinese hacker communities
AU - Fang, Zhen
AU - Zhao, Xinyi
AU - Wei, Qiang
AU - Chen, Guoqing
AU - Zhang, Yong
AU - Xing, Chunxiao
AU - Li, Weifeng
AU - Chen, Hsinchun
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/11/15
Y1 - 2016/11/15
N2 - Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.
AB - Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers and emerging threats in Chinese hacker communities. Specifically, we develop a set of topic models for extracting popular topics, tracking topic evolution, and identifying key hackers with their specialty topics. We applied our framework to 19 major Chinese hacker communities. As a result, we identified five major popular topics, including trading, fraud prevention & identification, calling for cooperation, casual chat, and monetizing. Moreover, we found several trends related to new communication channels, new stolen cards of interest, and new operating mechanism. Further, we also found the key hackers in each extracted area. Our work contributes to the cybersecurity literature by providing an advanced and scalable framework for analyzing Chinese hacker communities.
KW - Chinese hacker community
KW - cybersecurity
KW - key hacker
KW - topic evolution
KW - topic modeling
UR - http://www.scopus.com/inward/record.url?scp=85003977001&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85003977001&partnerID=8YFLogxK
U2 - 10.1109/ISI.2016.7745436
DO - 10.1109/ISI.2016.7745436
M3 - Conference contribution
AN - SCOPUS:85003977001
T3 - IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016
SP - 13
EP - 18
BT - IEEE International Conference on Intelligence and Security Informatics
A2 - Mao, Wenji
A2 - Wang, G. Alan
A2 - Zhou, Lina
A2 - Kaati, Lisa
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
Y2 - 28 September 2016 through 30 September 2016
ER -