Researchers explore how cyber-attackers think like regular crooks

Nov 30, 2011 By Missy Corley

In a unique collaboration, an engineer and a criminologist at the University of Maryland are applying criminological concepts and research methods in the study of cybercrime. Their work has produced recommendations for IT managers to use in the prevention of cyber attacks on their networks.

Michel Cukier, associate professor of reliability engineering at the A. James Clark School of Engineering and Institute for Systems Research, and David Maimon, assistant professor of and criminal justice in the College of Behavioral and Social Sciences, are studying cyberattacks from two different angles - that of the user and that of the attacker. Both are members of the Maryland Center.

Their work is the first look at the relationship between computer-network activity patterns and computer-focused crime trends.

"We believe that criminological insights in the study of cybercrime are important, since they may support the development of concrete security policies that consider not only the technical element of cybercrime but also the human component," Maimon said.

In one study that focused on the victims of cyberattacks, the researchers analyzed data made available by the university's Office of Information Technology, which included instances of computer exploits, illegal computer port scans and (DoS) attacks.

Applying criminological rationale proposed by the "Routine Activities Perspective," Maimon and Cukier analyzed computer focused crime trends between the years 2007-2009 against the university network.

According to this perspective, which is designed to understand criminal victimization trends, successful criminal incidents are the consequence of the convergence in space and time of motivated offenders, suitable victims, and the absence of capable guardians. The researchers hypothesized that the campus would be more likely to be cyberattacked during business hours than during down times like after midnight and on weekends. Their study of the campus data confirmed their theories.

"Our analysis demonstrates that computer-focused crimes are more frequent during times of day that computer users are using their networked computers to engage in their daily working and studying routines," Maimon said.

"Users expose the network to attacks," Cukier said. Simply by browsing sites on the Web, Internet users make their computers' IP addresses and ports visible to possible attackers. So, "the users' behavior does reflect on the entire organization's security."

Maimon, a sociologist, takes the study a step further.

"Your computer network's social composition will determine where your attacks come from," he said. In a similar vein, "the kinds of places you go influence the types of attacks you get. Our study demonstrates that, indeed, network users are clearly linked to observed network attacks and that efficient security solutions should include the human element."

Cukier adds, "The study shows that the human aspect needs to be included in security studies, where humans are already referred as the 'weakest link.'"

Cukier and Maimon said the results of their research point to the following potential solutions:

1) Increased education and awareness of the risks associated with computer-assisted and computer-focused crimes among network users could prevent future attacks;

2) Further defense strategies should rely on predictions regarding the sources of attacks, based on the network users' social backgrounds and online routines.

"Michel and David's research exemplifies the interdisciplinary and comprehensive approach of the Maryland Cybersecurity Center," noted Michael Hicks, director of the Maryland Cybersecurity Center. "Resources are not unlimited, so true solutions must consider the motivations of the actors, both attackers and defenders, as well as the technological means to thwart an attack. Michel, an engineer, and David, a , are considering both sides of this equation, with the potential for game-changing results."

Explore further: Pop music heritage contributes to the formation of identity

add to favorites email to friend print save as pdf

Related Stories

Researchers find way to measure effect of Wi-Fi attacks

Sep 12, 2011

Researchers from North Carolina State University have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks – a valuable tool for developing new security technologies.

Understanding the social side of cyber-security issues

May 04, 2011

When Engin Kirda started focusing on cyber-security research 10 years ago, those primarily responsible for launching Internet attacks were teenagers out for kicks, he said. But the scope of threats existing ...

Cyber criminals cloak their tracks

Feb 13, 2008

The 2007 X-Force Security report from IBM finds a disturbing rise in the sophistication of attacks by criminals on Web browsers worldwide. According to IBM, by attacking the browsers of computer users, cyber criminals are ...

Female-Name Chat Users Get 25 Times More Malicious Messages

May 09, 2006

A study by the University of Maryland's A. James Clark School of Engineering found that chat room participants with female usernames received 25 times more threatening and/or sexually explicit private messages than those ...

Hackers turn PlayStation into pay station

May 10, 2011

In late April, a hacker crippled Sony’s PlayStation Network by stealing the names, home addresses and perhaps even the credit card numbers of some 70 million subscribers, who play and download games through ...

Recommended for you

Pop music heritage contributes to the formation of identity

18 hours ago

The musical rebels of the past are today's museum pieces. Pop music is increasingly penetrating heritage institutions such as museums and archives. That is apparent from the PhD research of Arno van der Hoeven. On Thursday ...

Helping older employees stay in their jobs

18 hours ago

Factors that can hinder older employees from continuing to work include workload, a poor memory and the pensionable age-effect. The Job-Exposure Matrix is a newly developed instrument that provides an easy way to chart the ...

Explainer: What is a small private online course?

19 hours ago

If you have studied an online course at a university over the past couple of decades, you've probably already experienced a SPOC, or Small Private Online Course. SPOC is a new term for an old concept, which appears to be frustrating members of the distance edu ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

tadchem
not rated yet Nov 30, 2011
There are several 'types' of crime, and the criminals who commit them are just as diverse. Cybercriminals will have little in common with junkies who rob to get cash for a fix, or with emotional criminals who act out of rage, lust, or anger. They will have more in common with the sociopaths who perform elaborately planned acts such as fraud, espionage, sabotage, and the like.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.