To Change Or To Stick: Unveiling The Consistency Of Cyber Criminal Signatures Through Statistical Analysis
- URL: http://arxiv.org/abs/2408.00499v1
- Date: Thu, 1 Aug 2024 12:08:40 GMT
- Title: To Change Or To Stick: Unveiling The Consistency Of Cyber Criminal Signatures Through Statistical Analysis
- Authors: Ronan Mouchoux, François Moerman,
- Abstract summary: This study unveils the elusive presence of criminal signatures in cyberspace, validating for the first time their existence through statistical evidence.
Our findings verify the existence of unique signatures associated with advanced cybercriminals, bridging a crucial gap in current understanding of human behavior in cyber-attacks.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: This study unveils the elusive presence of criminal signatures in cyberspace, validating for the first time their existence through statistical evidence. By applying the A priori algorithm to the modus operandi of Advanced Persistent Threats, extracted from an extensive corpus of over 17,000 articles spanning 2007 to 2020, we highlight the enduring patterns leveraged by sophisticated cyber criminals. Our findings verify the existence of unique signatures associated with advanced cybercriminals, bridging a crucial gap in current understanding of human behavior in cyber-attacks. This pivotal research sets the foundation for an entirely new academic intersection in cybersecurity and computational criminology.
Related papers
- 1D-CNN-IDS: 1D CNN-based Intrusion Detection System for IIoT [2.192061681117835]
This study developed a one-dimensional convolutional neural network (1DCNN) algorithm for cyber-attack classification.
The proposed study achieved an accuracy of 99.90% to classify nine cyber-attacks.
arXiv Detail & Related papers (2024-09-13T04:22:40Z) - Red Teaming Generative AI/NLP, the BB84 quantum cryptography protocol
and the NIST-approved Quantum-Resistant Cryptographic Algorithms [2.3020018305241337]
This research delves into the cybersecurity implications of AI/Natural Language Processing (NLP) models and quantum cryptographic protocols.
Utilising Python and C++ as primary computational tools, the study employs a "red teaming" approach, simulating potential cyber-attacks.
The study's overarching goal is to ensure that as the digital world transitions to quantum-enhanced operations, it remains resilient against AI-driven cyber threats.
arXiv Detail & Related papers (2023-09-17T00:59:14Z) - Recent Advancements in Machine Learning For Cybercrime Prediction [2.38324507743994]
This paper aims to comprehensively survey the latest advancements in cybercrime prediction.
We reviewed more than 150 research articles and discussed 50 most recent and appropriate ones.
This paper presents a holistic view of cutting-edge developments and publicly available datasets.
arXiv Detail & Related papers (2023-04-10T19:00:29Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Spatial-Temporal Hypergraph Self-Supervised Learning for Crime
Prediction [60.508960752148454]
This work proposes a Spatial-Temporal Hypergraph Self-Supervised Learning framework to tackle the label scarcity issue in crime prediction.
We propose the cross-region hypergraph structure learning to encode region-wise crime dependency under the entire urban space.
We also design the dual-stage self-supervised learning paradigm, to not only jointly capture local- and global-level spatial-temporal crime patterns, but also supplement the sparse crime representation by augmenting region self-discrimination.
arXiv Detail & Related papers (2022-04-18T23:46:01Z) - Spatial-Temporal Sequential Hypergraph Network for Crime Prediction [56.41899180029119]
We propose Spatial-Temporal Sequential Hypergraph Network (ST-SHN) to collectively encode complex crime spatial-temporal patterns.
In particular, to handle spatial-temporal dynamics under the long-range and global context, we design a graph-structured message passing architecture.
We conduct extensive experiments on two real-world datasets, showing that our proposed ST-SHN framework can significantly improve the prediction performance.
arXiv Detail & Related papers (2022-01-07T12:46:50Z) - Profiling the Cybercriminal: A Systematic Review of Research [2.66512000865131]
There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
arXiv Detail & Related papers (2021-05-06T19:56:55Z) - Online Adversarial Attacks [57.448101834579624]
We formalize the online adversarial attack problem, emphasizing two key elements found in real-world use-cases.
We first rigorously analyze a deterministic variant of the online threat model.
We then propose algoname, a simple yet practical algorithm yielding a provably better competitive ratio for $k=2$ over the current best single threshold algorithm.
arXiv Detail & Related papers (2021-03-02T20:36:04Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Adversarial vs behavioural-based defensive AI with joint, continual and
active learning: automated evaluation of robustness to deception, poisoning
and concept drift [62.997667081978825]
Recent advancements in Artificial Intelligence (AI) have brought new capabilities to behavioural analysis (UEBA) for cyber-security.
In this paper, we present a solution to effectively mitigate this attack by improving the detection process and efficiently leveraging human expertise.
arXiv Detail & Related papers (2020-01-13T13:54:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.