• DocumentCode
    588629
  • Title

    Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study

  • Author

    Sobesto, Bertrand ; Cukier, Michel ; Maimon, D.

  • Author_Institution
    Clark Sch. of Eng., Univ. of Maryland, College Park, MD, USA
  • fYear
    2012
  • fDate
    27-30 Nov. 2012
  • Firstpage
    191
  • Lastpage
    200
  • Abstract
    This paper describes an empirical study to assess whether computer focused crimes are impacted by system configurations. The study relies on data collected during 30 days on a farm of target computers of various configurations (disk space, memory size, and bandwidth). In addition, some target computers included a warning sign. Following a brute force attack on SSH, attackers randomly access one of these computer configurations and are allowed to use it for 30 days. We monitor network traffic and attackers´ keystrokes to analyze the attack. This paper focuses specifically on the crime, i.e., the use of the computer to launch an attack towards an external target. We define various computer focused crime characteristics (i.e., whether the attack was destructive or not, whether the target was an opportunity or a choice, whether the attack was coordinated or not) and analyze whether the committed crime is significantly impacted by the system configuration.
  • Keywords
    computer crime; bandwidth; brute force attack; computer focused crimes; data collection; disk space; external target; memory size; network traffic monitoring; system configurations; Bandwidth; Computers; Containers; Force; IP networks; Logic gates; Computer Focused Crime; Empirical Study; Honeypots;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium on
  • Conference_Location
    Dallas, TX
  • ISSN
    1071-9458
  • Print_ISBN
    978-1-4673-4638-2
  • Type

    conf

  • DOI
    10.1109/ISSRE.2012.36
  • Filename
    6405367