Abstract | ||
---|---|---|
This paper describes an empirical study to assess whether computer focused crimes are impacted by system configurations. The study relies on data collected during 30 days on a farm of target computers of various configurations (disk space, memory size, and bandwidth). In addition, some target computers included a warning sign. Following a brute force attack on SSH, attackers randomly access one of these computer configurations and are allowed to use it for 30 days. We monitor network traffic and attackers' keystrokes to analyze the attack. This paper focuses specifically on the crime, i.e., the use of the computer to launch an attack towards an external target. We define various computer focused crime characteristics (i.e., whether the attack was destructive or not, whether the target was an opportunity or a choice, whether the attack was coordinated or not) and analyze whether the committed crime is significantly impacted by the system configuration. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/ISSRE.2012.36 | Software Reliability Engineering |
Keywords | Field | DocType |
computer crime,bandwidth,brute force attack,computer focused crimes,data collection,disk space,external target,memory size,network traffic monitoring,system configurations,Computer Focused Crime,Empirical Study,Honeypots | Honeypot,Brute-force attack,Computer science,Computer security,System configuration,Bandwidth (signal processing),Empirical research | Conference |
ISSN | ISBN | Citations |
1071-9458 | 978-1-4673-4638-2 | 1 |
PageRank | References | Authors |
0.37 | 10 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Bertrand Sobesto | 1 | 1 | 0.37 |
Michel Cukier | 2 | 1 | 1.04 |
David Maimon | 3 | 1 | 2.73 |