A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

被引:29
作者
Biswas, Baidyanath [1 ]
Mukhopadhyay, Arunabha [2 ]
Bhattacharjee, Sudip [3 ]
Kumar, Ajay [4 ]
Delen, Dursun [5 ,6 ]
机构
[1] Int Management Inst IMI, Kolkata, India
[2] Indian Inst Management, Lucknow, Uttar Pradesh, India
[3] Univ Connecticut, Sch Business, Dept Operat & Informat Management, Storrs, CT 06269 USA
[4] EMLYON Business Sch, Ecully, France
[5] Oklahoma State Univ, Spears Sch Business, Ctr Hlth Syst Innovat, Stillwater, OK 74078 USA
[6] Ibn Haldun Univ, Sch Business, Istanbul, Turkey
关键词
Information security; Cyber risks; Hacker forum; Machine learning; Sentiment analysis; SOCIAL MEDIA; KNOWLEDGE; BEHAVIOR; COMMUNITIES; EXCHANGE; IMPROVE; MODELS;
D O I
10.1016/j.dss.2021.113651
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals where they engage in technical discussions, share exploits and relevant hacking tools to be used in launching cyber-attacks on business organizations. Sometimes, the affected organizations can detect these attacks in advance, with the help of cyberthreat intelligence derived from the explicit and implicit features of hacker communication in these forums. Herein, we proposed a novel text-mining based cyber-risk assessment and mitigation framework, which performs the following critical tasks. (i) Cyber-risk Assessment - to identify hacker expertise (i.e., newbie, beginner, intermediate, and advanced) using explicit and implicit features applying various classification algorithms. Among these features, cybersecurity keywords, sharing of attachments, and sentiments emerged as significant. Further, we found that expert hackers demonstrate leadership in the online forums that eventually serve as communities of practice. Consequently, novice hackers gradually develop their cyber-attack skills through prolonged observations, interactions, and external influences in this social learning process. (ii) Cyber-risk mitigation - computes financial impact for every {hacker expertise, attack-type} combination, and then by ranking them on a {likelihood, impact} decision-matrix to prioritize mitigation strategies in affected organizations. Through these novel recommendations, our framework can guide managers to decide on appropriate cybersecurity controls using an {expected loss, probability, attack-type, hacker expertise} metric against financial losses due to cyber-attacks.
引用
收藏
页数:13
相关论文
共 53 条
  • [1] Co-creating value in online innovation communities
    Akman, Hande
    Plewa, Carolin
    Conduit, Jodie
    [J]. EUROPEAN JOURNAL OF MARKETING, 2019, 53 (06) : 1205 - 1233
  • [2] [Anonymous], 2015, LIWC 2015 operators manual
  • [3] Armstrong A.e., 1997, Net gain: Expanding markets through virtual communities
  • [4] Adopting automated whitelist approach for detecting phishing attacks
    Azeez, Nureni Ayofe
    Misra, Sanjay
    Margaret, Ihotu Agbo
    Fernandez-Sanz, Luis
    Abdulhamid, Shafi'i Muhammad
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [5] Benjamin Victor, 2012, Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics. Cyberspace, Border, and Immigration Securities (ISI 2012), P24, DOI 10.1109/ISI.2012.6283296
  • [6] DICE-E: A FRAMEWORK FOR CONDUCTING DARKNET IDENTIFICATION, COLLECTION, EVALUATION WITH ETHICS
    Benjamin, Victor
    Valacich, Joseph S.
    Chen, Hsinchun
    [J]. MIS QUARTERLY, 2019, 43 (01) : 1 - 22
  • [7] Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities
    Benjamin, Victor
    Zhang, Bin
    Nunamaker, Jay F., Jr.
    Chen, Hsinchun
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2016, 33 (02) : 482 - 510
  • [8] EXCHANGE AND POWER IN SOCIAL-LIFE - BLAU,PM
    BIERSTEDT, R
    [J]. AMERICAN SOCIOLOGICAL REVIEW, 1965, 30 (05) : 789 - 790
  • [9] Examining the determinants of the count of customer reviews in peer-to-peer home-sharing platforms using clustering and count regression techniques
    Biswas, Baidyanath
    Sengupta, Pooja
    Chatterjee, Dwaipayan
    [J]. DECISION SUPPORT SYSTEMS, 2020, 135 (135)
  • [10] Biswas B, 2018, PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), P1752