Skip to main content
Log in

Understanding cyberbullying as an information security attack—life cycle modeling

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Nowadays, cyberbullying cases are more common due to free access to technological resources. Studies related to this phenomenon from the fields of computer science and computer security are still limited. Several factors such as the access to specific databases on cyberbullying, the unification of scientific criteria that assess the nature of the problem, or the absence of real proposals that prevent and mitigate this problem could motivate the lack of interest by researchers in the field of information security to generate significant contributions. This research proposes a cyberbullying life cycle model through topic modeling and conceptualizes the different stages of the attack considering criteria associated with computer attacks. This proposal is supported by a review of the specific literature and knowledge bases gained from experiences of victims of online harassment and tweets from attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Margono H (2019) Analysis of the indonesian cyberbullying through data mining: the effective identification of cyberbullying through characteristics of messages. Ph.D. Thesis, Victoria University

  2. Huber S, Wiemer H, Schneider D, Ihlenfeldt S (2019) Dmme: data mining methodology for engineering applications–a holistic extension to the crisp-dm model. Procedia CIRP 79:403–408

    Article  Google Scholar 

  3. Aalsma MC, Brown JR (2008) What is bullying?. J Adolesc Health 43(2):101–102

    Article  Google Scholar 

  4. Volk AA, Dane AV, Marini ZA (2014) What is bullying? A theoretical redefinition. Dev Rev 34(4):327–343

    Article  Google Scholar 

  5. Al Mazari A (2013) Cyber-bullying taxonomies: definition, forms, consequences and mitigation strategies. In: 2013 5th International Conference on Computer Science and Information Technology, IEEE, pp 126–133

  6. Zhong H, Miller DJ, Squicciarini A (2018) Flexible inference for cyberbully incident detection. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, pp 356–371

  7. kaspersky (2020) Cyberbullying: The cybercrime of the century

  8. Oweis NE, Alrababa MA, Oweis WG, Owais SS, Alansari M (2014) A survey of internet security risk over social networks. In: 2014 6th International Conference on Computer Science and Information Technology (CSIT), IEEE, pp 1–4

  9. Nahar V, Unankard S, Li X, Pang C (2012) Sentiment analysis for effective detection of cyber bullying. In: Asia-Pacific Web Conference, Springer, pp 767–774

  10. Dhond V, Richter S, McKenna B (2018) Exploratory research to identify the characteristics of cyber victims on social media in new zealand. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, Springer, pp 193– 210

  11. Jabeen F, Treur J (2018) Computational analysis of bullying behavior in the social media era. In: International Conference on Computational Collective Intelligence, Springer, pp 192–205

  12. Sedano CR, Ursini EL, Martins PS (2017) A bullying-severity identifier framework based on machine learning and fuzzy logic. In: International Conference on Artificial Intelligence and Soft Computing, Springer, pp 315–324

  13. Del Bosque LP, Garza SE (2014) Aggressive text detection for cyberbullying. In: Mexican International Conference on Artificial Intelligence, Springer, pp 221–232

  14. Hosseinmardi H, Mattson SA, Rafiq RI, Han R, Lv Q, Mishra S (2015) Analyzing labeled cyberbullying incidents on the instagram social network. In: International conference on social informatics, Springer, pp 49–66

  15. Dadvar M, Ordelman R, de Jong F, Trieschnigg D (2012) Towards user modelling in the combat against cyberbullying. In: International Conference on Application of Natural Language to Information Systems, Springer, pp 277–283

  16. Dadvar M, Trieschnigg D, Ordelman R, de Jong F (2013) Improving cyberbullying detection with user context. In: European Conference on Information Retrieval, Springer, pp 693–696

  17. Thawiworadilok C, Songhori MJ, Terano T (2015) Investigating Japanese Ijime (bullying) behavior using agent-based and system dynamics models. In: Australasian Joint Conference on Artificial Intelligence, Springer, pp 554–558

  18. Potha N, Maragoudakis M (2015) Time series forecasting in cyberbullying data. In: International Conference on Engineering Applications of Neural Networks, Springer, pp 289–303

  19. Liu J, Tao Y, Bai Q (2016) Towards exposing cyberstalkers in online social networks. In: Pacific Rim International Conference on Artificial Intelligence, Springer, pp 763–770

  20. Al-Garadi MA, Hussain MR, Khan N, Murtaza G, Nweke HF, Ali I, Mujtaba G, Chiroma H, Khattak HA, Gani A (2019) Predicting cyberbullying on social media in the big data era using machine learning algorithms: review of literature and open challenges. IEEE Access 7:70701–70718

    Article  Google Scholar 

  21. Ting I-H, Liou WS, Liberona D, Wang S-L, Bermudez GMT (2017) Towards the detection of cyberbullying based on social network mining techniques. In: 2017 International Conference on Behavioral, Economic, Socio-cultural Computing (BESC), IEEE, pp 1–2

  22. Haidar B, Chamoun M, Serhrouchni A (2017) Multilingual cyberbullying detection system: detecting cyberbullying in arabic content. In: 2017 1st Cyber Security in Networking Conference (CSNet), IEEE, pp 1–8

  23. Banerjee V, Telavane J, Gaikwad P, Vartak P (2019) Detection of cyberbullying using deep neural network. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), IEEE, pp 604–607

  24. Upadhyay A, Chaudhari A, Ghale S, Pawar SS, et al (2017) Detection and prevention measures for cyberbullying and online grooming. In: 2017 International Conference on Inventive Systems and Control (ICISC), IEEE, pp 1–4

  25. Parime S, Suri V (2014) Cyberbullying detection and prevention: data mining and psychological perspective. In: 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014], IEEE, pp 1541–1547

  26. Eshan SC, Hasan MS (2017) An application of machine learning to detect abusive bengali text. In: 2017 20th International Conference of Computer and Information Technology (ICCIT), IEEE, pp 1–6

  27. Al-Ajlan MA, Ykhlef M (2018) Optimized twitter cyberbullying detection based on deep learning. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), IEEE, pp 1–5

  28. Mohan S, Valsaladevi I, Thampi SM (2019) ”think before you post”: A cognitive psychological approach for limiting bullying in social media. In: International Conference on Smart City and Informatization, Springer, pp 418–434

  29. Isa SM, Ashianti L, et al. (2017) Cyberbullying classification using text mining. In: 2017 1st International Conference on Informatics and Computational Sciences (ICICoS), IEEE, pp 241–246

  30. Dadvar M, Trieschnigg D, de Jong F (2014) Experts and machines against bullies: a hybrid approach to detect cyberbullies. In: Canadian Conference on Artificial Intelligence, Springer, pp 275–281

  31. Wachs S, Schubarth W, Seidel A, Piskunova E (2018) Detecting and interfering in cyberbullying among young people (foundations and results of german case-study). In: International Conference on Digital Transformation and Global Society, Springer, pp 277–285

  32. Won J, Seo D (2017) Relationship between self-disclosure and cyberbullying on snss. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, Springer, pp 154–172

  33. Agrawal S, Awekar A (2018) Deep learning for detecting cyberbullying across multiple social media platforms. In: European Conference on Information Retrieval, Springer, pp 141–153

  34. Dev H, Ali ME, Mahmud J, Sen T, Basak M, Paul R (2015) A real-time crowd-powered testbed for content assessment of potential social media posts. In: International Conference on Social Informatics, Springer, pp 136–152

  35. Dani H, Li J, Liu H (2017) Sentiment informed cyberbullying detection in social media. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Springer, pp 52–67

  36. Sintaha M, Mostakim M (2018) An empirical study and analysis of the machine learning algorithms used in detecting cyberbullying in social media. In: 2018 21st International Conference of Computer and Information Technology (ICCIT), IEEE, pp 1–6

  37. Tapia F, Aguinaga C, Luje R (2018) Detection of behavior patterns through social networks like twitter, using data mining techniques as a method to detect cyberbullying. In: 2018 7th International Conference On Software Process Improvement (CIMPS), IEEE, pp 111–118

  38. Rakib TBA, Soon L-K (2018) Using the reddit corpus for cyberbully detection. In: Asian Conference on Intelligent Information and Database Systems, Springer, pp 180–189

  39. Ptaszynski M, Masui F, Kimura Y, Rzepka R, Araki K (2015) Automatic extraction of harmful sentence patterns with application in cyberbullying detection. In: Language and Technology Conference, Springer, pp 349–362

  40. Nahar V, Al-Maskari S, Li X, Pang C (2014) Semi-supervised learning for cyberbullying detection in social networks. In: Australasian Database Conference, Springer, pp 160–171

  41. Del Bosque LP, Garza SE (2016) Prediction of aggressive comments in social media: an exploratory study. IEEE Lat Am Trans 14(7):3474–3480

    Article  Google Scholar 

  42. Nadali S, Murad MAA, Sharef NM, Mustapha A, Shojaee S (2013) A review of cyberbullying detection: an overview. In: 2013 13th International Conference on Intellient Systems Design and Applications, IEEE, pp 325–330

  43. Kovačević A (2014) Cyberbullying detection using web content mining. In: 2014 22nd Telecommunications Forum Telfor (TELFOR), IEEE, pp 939–942

  44. Altay EV, Alatas B (2018) Detection of cyberbullying in social networks using machine learning methods. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), IEEE, pp 87–91

  45. Özel SA, Saraç E, Akdemir S, Aksu H (2017) Detection of cyberbullying on social media messages in Turkish. In: 2017 International Conference on Computer Science and Engineering (UBMK), IEEE, pp 366–370

  46. Mahlangu T, Tu C, Owolawi P (2018) A review of automated detection methods for cyberbullying. In: 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), IEEE, pp 1–5

  47. Chavan VS, Shylaja SS (2015) Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, pp 2354–2358

  48. Romsaiyud W (2016) Expectation-maximization algorithm for topic modeling on big data streams. In: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE, pp 1–7

  49. Sharma HK, Kshitiz K, et al (2018) Nlp and machine learning techniques for detecting insulting comments on social networking platforms. In: 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), IEEE, pp 265–272

  50. Çürük E, Acı C, Eşsiz ES (2018) Performance analysis of artificial neural network based classifiers for cyberbullying detection. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), IEEE, pp 1–5

  51. Sugandhi R, Pande A, Chawla S, Agrawal A, Bhagat H (2015) Methods for detection of cyberbullying: a survey. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), IEEE, pp 173–177

  52. Bu S-J, Cho S-B (2018) A hybrid deep learning system of cnn and lrcn to detect cyberbullying from sns comments. In: International Conference on Hybrid Artificial Intelligence Systems, Springer, pp 561–572

  53. Fazil M, Abulaish M (2018) A hybrid approach for detecting automated spammers in Twitter. IEEE Transactions on Information Forensics and Security 13(11):2707–2719

    Article  Google Scholar 

  54. Çürük E, Acı C, Eşsiz ES (2018) The effects of attribute selection in artificial neural network based classifiers on cyberbullying detection. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), IEEE, pp 6–11

  55. Andriansyah M, Akbar A, Ahwan A, Gilani NA, Nugraha AR, Sari RN, Senjaya R (2017) Cyberbullying comment classification on Indonesian selebgram using support vector machine method. In: 2017 Second International Conference on Informatics and Computing (ICIC), IEEE, pp 1–5

  56. Gorro KD, Sabellano MJG, Gorro K, Maderazo C, Capao K (2018) Classification of cyberbullying in Facebook using selenium and svm. In: 2018 3rd International Conference on Computer and Communication Systems (ICCCS), IEEE, pp 183– 186

  57. Yao M, Chelmis C, Zois D-S (2018) Cyberbullying detection on instagram with optimal online feature selection. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, pp 401– 408

  58. Bourgonje P, Moreno-Schneider J, Srivastava A, Rehm G (2017) Automatic classification of abusive language and personal attacks in various forms of online communication. In: International Conference of the German Society for Computational Linguistics and Language Technology, Springer, Cham, pp 180–191

  59. Obadimu A, Mead E, Hussain MN, Agarwal N (2019) Identifying toxicity within Youtube video comment. In: International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation, Springer, pp 214–223

  60. Silva YN, Rich C, Hall D (2016) Bullyblocker: towards the identification of cyberbullying in social networking sites. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), IEEE, pp 1377–1379

  61. Mouheb D, Ismail R, Al Qaraghuli S, Al Aghbari Z, Kamel I (2018) Detection of offensive messages in arabic social media communications. In: 2018 International Conference on Innovations in Information Technology (IIT), IEEE, pp 24–29

  62. Febriana T, Budiarto A (2019) Twitter dataset for hate speech and cyberbullying detection in indonesian language. In: 2019 International Conference on Information Management and Technology (ICIMTech), vol 1, IEEE, pp 379–382

  63. Ali WNHW, Mohd M, Fauzi F (2018) Cyberbullying detection: an overview. In: 2018 Cyber Resilience Conference (CRC), IEEE, pp 1–3

  64. Mouton F, Leenen L, Venter HS (2016) Social engineering attack examples, templates and scenarios. Computers and Security 59:186–209. https://doi.org/10.1016/j.cose.2016.03.004.

    Article  Google Scholar 

  65. Nohlberg M, Kowalski S (2008) The cycle of deception: a model of social engineering attacks, defenses and victims. In: Second International Symposium on Human Aspects of Information Security and Assurance (HAISA 2008), Plymouth, UK, 8-9 July 2008, University of Plymouth, pp 1–11

  66. Bakhshi T (2017) Social engineering: revisiting end-user awareness and susceptibility to classic attack vectors. In: Emerging Technologies (ICET), 2017 13th International Conference on, IEEE, pp 1–6

  67. Mitnick KD, Simon W L, Wozniak S (2006) The art of deception: controlling the human element of security. 2002. Paperback ISBN 0-471-23712-4

  68. Zambrano P, Torres J, Flores P (2019) How does grooming fit into social engineering?. In: Advances in computer communication and computational sciences. Springer, pp 629–639

  69. Radack S (2011) Managing information security risk: organization, mission and information system view, National Institute of Standards and Technology

  70. Kissel R (2011) Glossary of key information security terms. Diane Publishing

  71. Chen P, Desmet L, Huygens C (2014) A study on advanced persistent threats. In: IFIP International Conference on Communications and Multimedia Security, Springer, pp 63–72

  72. Messaoud Brahim ID, Guennoun K, Wahbi M, Sadik M (2016) Advanced persistent threat: new analysis driven by life cycle phases and their challenges. In: 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS), IEEE, pp 1–6

  73. Alshamrani A, Myneni S, Chowdhary A, Huang D (2019) A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials 21(2):1851–1877

    Article  Google Scholar 

  74. Shenwen L, Yingbo L, Xiongjie D (2015) Study and research of apt detection technology based on big data processing architecture. In: 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication, IEEE, pp 313–316

  75. Ussath M, Jaeger D, Cheng F, Meinel C (2016) Advanced persistent threats: behind the scenes. In: 2016 Annual Conference on Information Science and Systems (CISS), IEEE, pp 181– 186

  76. Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 1(1):80

    Google Scholar 

  77. Lee P-J, Hu Y-H, Chen K, Tarn JM, Cheng L-E (2018) Cyberbullying detection on social network services.. In: PACIS, p 61

  78. Wang W, Barnaghi PM, Bargiela A (2009) Probabilistic topic models for learning terminological ontologies. IEEE Trans Knowl Data Eng 22(7):1028–1040

    Article  Google Scholar 

  79. Daud A, Li J, Zhou L, Muhammad F (2010) Knowledge discovery through directed probabilistic topic models: a survey. Frontiers of computer science in China 4(2):280–301

    Article  Google Scholar 

  80. Lu Y, Mei Q, Zhai C (2011) Investigating task performance of probabilistic topic models: an empirical study of PLSA and LDA. Inf Retr 14(2):178–203

    Article  Google Scholar 

  81. Alghamdi R, Alfalqi K (2015) A survey of topic modeling in text mining. Int J Adv Comput Sci Appl (IJACSA) 6(1):147–153

    Google Scholar 

  82. Fast E, Chen B, Bernstein MS (2016) Empath: understanding topic signals in large-scale text. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp 4647–4657

  83. Mouton F, Malan MM, Leenen L, Venter HS (2014) Social engineering attack framework. In: Information Security for South Africa (ISSA), 2014, IEEE, pp 1–9

  84. Sharma A, Sharma R, Sharma VK, Shrivatava V (2014) Application of data mining–a survey paper. International Journal of Computer Science and Information Technologies 5(2):2023–2025

    Google Scholar 

  85. Sondwale PP (2015) Overview of predictive and descriptive data mining techniques. International Journal of Advanced Research in Computer Science and Software Engineering 5(4):262–265

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patricio Zambrano.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zambrano, P., Torres, J., Yánez, Á. et al. Understanding cyberbullying as an information security attack—life cycle modeling. Ann. Telecommun. 76, 235–253 (2021). https://doi.org/10.1007/s12243-020-00785-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-020-00785-0

Keywords

Navigation