The classification of hackers by knowledge exchange behaviors
- 1.1k Downloads
This paper examines messages posted in a hacker forum and constructs four user profiles based on the observed behavior patterns. It starts with the development of an automated forum post classification system to understand the knowledge transfer pattern exhibited by each user over time. Two patterns, knowledge acquisition and knowledge provision, are noted to be particularly informative. Based on these two and other user characteristics, user profiles are classified into four types: guru hackers, casual hackers, learning hackers, and novice hackers. Guru hackers are knowledgeable and respectable. They usually share ideas and advice with others. Casual hackers tend to act as observers. They can be skilled hackers who show interest mainly in deriving usable information from the forum. Learning hackers are also expert hackers who utilize the forum basically for learning. They actively seek knowledge and tend to share more of it over time. Novice hackers are new learners who typically join the forum for a short period. Overall, it is found that hacker communities very much represent learning communities where meritocracy is in place.
KeywordsHacker Hacker profile Knowledge transfer Online learning Hacker ecosystem
The work described in this paper was partial supported by a grant from the Research Grants Council of the Hong Kong Special Administrative Region, China (Project No. CityU 152611)
- Abbasi, A., et al. (2010). Detecting fake websites: the contribution of statistical learning theory. MIS Quarterly, 34(3), 1–28.Google Scholar
- Abuhamdieh, A. (2006). Knowledge transfer in virtual communities. Review of Business Information Systems, 10(4), 23–36.Google Scholar
- Albanesius, C. (2011). Cyber crime costs $114B per year, mobile attacks on the rise. Retrieved August 2013, from http://www.pcmag.com/article2/0,2817,2392570,00.asp.
- Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee, J.-N. (2005). Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 29(1), 87–111.Google Scholar
- Chantler, N. (1997). Profile of a computer hacker. Seminole: Inter. Pact Press.Google Scholar
- Cortes, C., & Vapnik, V. (1995). Support - vector networks. Machine Learning, 20(3), 273–297.Google Scholar
- Hollinger, R. C. (1988). Computer hackers follow a guttman-like progression. Social Sciences Review, 72(3), 199–200.Google Scholar
- Holt, T. J. & Kilger, M. (2008). Techcrafters and makecrafters: A comparison of two populations of hackers. Paper presented at WOMBAT Workshop on Information Security Threats Data Collect and Sharing (WISTDCS2008), Amsterdam, Netherlands.Google Scholar
- Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6(1), 891–903.Google Scholar
- Joachims, T. (2002). Learning to classify text using support vector machines-methods, theory and algorithms, The Springer International Series in Engineering and Computer Science. Springer.Google Scholar
- Landreth, B. (1985). Out of the inner circile: A hacker’s guide to computer security. Redmond: Microsoft Books.Google Scholar
- Liu, X. et al. (2012). Harnessing global expertise: a comparative study of expertise profiling methods for online communities. Information Systems Frontiers, 1–13. doi: 10.1007/s10796-012-9385-6.
- Minshall, T. (2009). What is knowledge transfer?. Retrieved February 2014, from:http://www.cam.ac.uk/research/news/what-is-knowledge-transfer.
- Olson, P. (2012). We are anonymous: Inside the hacker world of LulzSec, anonymous, and the global cyber insurgency. New York: Back Bay Books.Google Scholar
- Phang, C. W., Kankanhalli, A., & Sabherwal, R. (2009). Usability and sociability in online communities: a comparative study of knowledge seeking and contribution. Journal of the Association for Information Systems, 10(10), 721–747.Google Scholar
- Pipkin, D. L. (2003). Halting the hacker: A practical guide to computer security (2nd ed.). Upper Saddle River: Prentice Hall Professional.Google Scholar
- Porter, M. F. (1980). An algorithm for suffix stripping. Readings in information retrieval (pp. 313–316).Google Scholar
- PricewaterhouseCoopers (2014). The Global State of Information Security Survey 2014, Retrieved March 2014, from: www.pwc.com.
- Sarma, M. & Lam, A. (2013). Knowledge creation and innovation in the virtual community? Exploring structure, values and identity in hacker groups. Paper presented at 35th DRUID Celebration Conference 2013, Barcelona, Spain.Google Scholar
- Shih, H.-P. & Huang, E. (2012). Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community. Information Systems Frontiers, 1–15. doi: 10.1007/s10796-012-9376-7.
- Wasko, M. M., & Faraj, S. (2005). Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29(1), 35–57.Google Scholar
- Whitman, M. E., & Mattord, H. J. (2012). Principles of information security (4th ed.). Boston: Course Technology Cengage Learning.Google Scholar