Cyber crime and hacking have become ubiquitous over the past decades. Although many studies have explored hacking communities, only a few have investigated hacking networks on the country and cross-country levels. We collected data on successful brute-force attacks (BFAs) and system-trespassing incidents (Sessions) on honeypots (HPs). Based on one million interactions in one month, we built a network of hackers and hacked data depicting the different roles of countries in the hacking scene. We depicted a suspected data exchange between the BFA and Session hackers and examined the network’s topology considering this data transfer. Mapping IP addresses and countries, we found that only a few countries lead the hacking activities and are the n...
This chapter will give an overview of research on hacking in the Netherlands and other non-English-l...
In this moment of rising nationalism worldwide, governments, civil society groups, transnational com...
Honeypots are a defensive cyber security countermeasure used to gather data on intruder activities. ...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
Hackers tend to be portrayed as criminals or activists. In current digital media landscapes, however...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
The financial and national security impacts of cybercrime globally are well documented. According to...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this ...
We employ knowledge regarding the early phases of system trespassing events and develop a contextrel...
Network infrastructures have played important part in most daily communications for business industr...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The cybersecurity community has made substantial efforts to understand and mitigate security flaws i...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
This chapter will give an overview of research on hacking in the Netherlands and other non-English-l...
In this moment of rising nationalism worldwide, governments, civil society groups, transnational com...
Honeypots are a defensive cyber security countermeasure used to gather data on intruder activities. ...
35 pagesThis chapter studies the activities of cyber attackers on a large scale honeypot running for...
Hackers tend to be portrayed as criminals or activists. In current digital media landscapes, however...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
The financial and national security impacts of cybercrime globally are well documented. According to...
This chapter studies the activities of cyber attackers on a large scale honeypot run-ning for more t...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this ...
We employ knowledge regarding the early phases of system trespassing events and develop a contextrel...
Network infrastructures have played important part in most daily communications for business industr...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The cybersecurity community has made substantial efforts to understand and mitigate security flaws i...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
This chapter will give an overview of research on hacking in the Netherlands and other non-English-l...
In this moment of rising nationalism worldwide, governments, civil society groups, transnational com...
Honeypots are a defensive cyber security countermeasure used to gather data on intruder activities. ...