Title
Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study
Abstract
This paper describes an empirical study to assess whether computer focused crimes are impacted by system configurations. The study relies on data collected during 30 days on a farm of target computers of various configurations (disk space, memory size, and bandwidth). In addition, some target computers included a warning sign. Following a brute force attack on SSH, attackers randomly access one of these computer configurations and are allowed to use it for 30 days. We monitor network traffic and attackers' keystrokes to analyze the attack. This paper focuses specifically on the crime, i.e., the use of the computer to launch an attack towards an external target. We define various computer focused crime characteristics (i.e., whether the attack was destructive or not, whether the target was an opportunity or a choice, whether the attack was coordinated or not) and analyze whether the committed crime is significantly impacted by the system configuration.
Year
DOI
Venue
2012
10.1109/ISSRE.2012.36
Software Reliability Engineering
Keywords
Field
DocType
computer crime,bandwidth,brute force attack,computer focused crimes,data collection,disk space,external target,memory size,network traffic monitoring,system configurations,Computer Focused Crime,Empirical Study,Honeypots
Honeypot,Brute-force attack,Computer science,Computer security,System configuration,Bandwidth (signal processing),Empirical research
Conference
ISSN
ISBN
Citations 
1071-9458
978-1-4673-4638-2
1
PageRank 
References 
Authors
0.37
10
3
Name
Order
Citations
PageRank
Bertrand Sobesto110.37
Michel Cukier211.04
David Maimon312.73