Do hacker subgroups share unique practices and knowledge? Is there a spatial characteristic to this sharing? The study investigates whether hackers who perform brute force attacks (BFAs) from different countries (different IPs) use a spatially based corpus of words for usernames and passwords. The study explores the usage of 975,000 usernames (UNs) and passwords (PWs) in brute force attacks on honeypot (HP) computers. The results suggest that hacker subgroups attacking from different countries use different combinations of UNs and PWs, while a few attacks coming from different IPs share the same corpus of words. This significant result can help in tracing the source of BFAs by identifying and analyzing the terms used in such attacks
Phishing is a kind of modern swindles that targets electronic communications users and aims to persu...
Phishing webpages present a previously underused resource for information on determining provenance ...
Phishing attacks are one of the most prevalent cybersecurity threats to modern organizations. As a r...
Cyber crime and hacking have become ubiquitous over the past decades. Although many studies have exp...
Online security is becoming an ever important topic in the modern social climate. People often creat...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
International audienceRegularly, hackers steal data sets containing user identifiers and passwords. ...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Despite advances in biometrics and other technologies, pass-words remain the most commonly used mean...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of password...
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents (bots) send...
User authentication is essential for accessing computing resources, network resources, email account...
Domain names were developed to ease the challenges that human beings face in remembering large sets ...
Phishing is a kind of modern swindles that targets electronic communications users and aims to persu...
Phishing webpages present a previously underused resource for information on determining provenance ...
Phishing attacks are one of the most prevalent cybersecurity threats to modern organizations. As a r...
Cyber crime and hacking have become ubiquitous over the past decades. Although many studies have exp...
Online security is becoming an ever important topic in the modern social climate. People often creat...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
International audienceRegularly, hackers steal data sets containing user identifiers and passwords. ...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Despite advances in biometrics and other technologies, pass-words remain the most commonly used mean...
In SSH brute forcing attacks, adversaries try a lot of different username and password combinations ...
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of password...
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents (bots) send...
User authentication is essential for accessing computing resources, network resources, email account...
Domain names were developed to ease the challenges that human beings face in remembering large sets ...
Phishing is a kind of modern swindles that targets electronic communications users and aims to persu...
Phishing webpages present a previously underused resource for information on determining provenance ...
Phishing attacks are one of the most prevalent cybersecurity threats to modern organizations. As a r...