[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3407023.3409181acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective

Published: 25 August 2020 Publication History

Abstract

Despite its development having changed and improved citizens' lives, cyberspace has also become a new arena for competition among states, organizations and individuals, and various cyber threats to people's security are becoming more prevalent, damaging and complex. Although it is rather commonly known that cyberspace is a battlefield, and almost every individual, organization or even state may fall victim to malicious hackers or greedy cybercriminals, the members of the public rarely seem to think of other sources of threat. Thus, in an attempt to raise the general awareness, this paper presents an additional number of selected, often unsuspected actors that shape and influence the cyberspace of today: nation-state actors, cyberterrorists, hacktivists and trolls. The motives of each actor, their modus operandi and the most significant representatives have also been discussed. Being aware of the existence and nature of each actor helps one better understand the threat they pose, as well as grasp the significance of the cybersecurity measures.

References

[1]
Lillian Ablon. 2018. The motivations of cyber threat actors and their use and monetization of stolen data: Hearings before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance, United States House, 115th Cong. 1. (2018).
[2]
Aseel Addawood, Adam Badawy, Kristina Lerman, and Emilio Ferrara. 2019. Linguistic Cues to Deception: Identifying Political Trolls on Social Media. In Proceedings of the Thirteenth International AAAI Conference on Web and Social Media (ICWSM 2019).
[3]
Keumar Afifi-Sabet. 2018. What is hacktivism? https://tinyurl.com/ups8xnc
[4]
Rabiah Ahmad and Zahri Yunos. 2012. A Dynamic Cyber Terrorism Framework. International Journal of Computer Science and Information Security (2012). https://tinyurl.com/qkx3akf
[5]
Alien Entity. 2002. Urban Dictionary: troll. https://tinyurl.com/dn3up
[6]
Anonymous. 2010. Cyberterrorism: The Invisible Threat Stealth Cyber Predators in a Climate of Escalating Risk. Foreign Affairs 89, 6 (2010). https://doi.org/sksjeuj
[7]
Charles Arthur. 2013. LulzSec: what they did, who they were and how they were caught. The Guardian (may 2013). https://tinyurl.com/gnahfp9
[8]
Chris Baraniuk. 2013. Ten Hacktivists Who Shook the Web. https://tinyurl.com/yxxvf8hm
[9]
C. Beggs. 2008. Cyber-Terrorism in Australia. IGI Global (2008).
[10]
Brian Benton. 2015. The Misinformers: Edward Snowden, Aaron Swartz and The Troubled Relationship Between Hacktivists, Mass Media and American Government. (2015).
[11]
David Bieda and Leila Halawi. 2015. Cyberspace: A Venue for Terrorism. Issues in Information Systems 16, 3 (2015).
[12]
Jonathan Bishop. 2012. Tackling Internet abuse in Great Britain: Towards a framework for classifying severities of 'flame trolling'.
[13]
Jonathan Bishop. 2013. The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater. International Journal of Cyber Criminology (2013). https://www.cybercrimejournal.com/Bishop2013janijcc.pdf
[14]
Russell Buchan. 2016. Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm. Journal of Conflict & Security Law (2016).
[15]
Tracey Caldwell. 2015. Hacktivism goes hardcore. Network Security 2015, 5 (2015), 12--17.
[16]
Erik Cambria, Praphul Chandra, Avinash Sharma, and Amir Hussain. 2010. Do Not Feel The Trolls. http://ceur-ws.org/Vol-664/paper1.pdf
[17]
Alan Charlish. 2019. Polish deputy minister resigns over judge trolling scandal. https://tinyurl.com/y5aghunx
[18]
Check Point Software Technologies Ltd. [n. d.]. What is Hacktivism? https://www.checkpoint.com/definitions/what-is-hacktivism/
[19]
Gabriella Coleman. 2014. Hacker, hoaxer, whistleblower, spy. The many faces of Anonymous. London.
[20]
Christine Cook, Juliette Schaafsma, and Marjolijn Antheunis. 2018. Under the bridge: An in-depth examination of online trolling in the gaming context. New Media & Society 20, 9 (sep 2018), 3323--3340.
[21]
Dorothy E. Denning. 2000. Cyberterrorism Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Technical Report.
[22]
Bülay Dogan. 2019. Contextualizing Hacktivism: The Criminalization of Redhack. CARGC Papers 10 (2019). https://tinyurl.com/vezoc8j
[23]
Dr. Viacheslav Dziundziuk. [n. d.]. Stopping Cyber terror Countries must work together to thwart efforts of internet Criminals. Per Concordiam, Journal of European Security and Defense Issues 2, 2 ([n. d.]). https://ccdcoe.org/uploads/2018/10/pC{_}V2N2{_}en.pdf
[24]
Max Eddy. 2019. Cyber Warfare Is Still a Free-for-All. PC Magazine (2019).
[25]
Kevvie Fowler. 2016. Data Breach Preparation and Response.
[26]
Francesca Gargano. 2019. Three Common Threat Actors and the One You Might Not Know About.
[27]
Theodore P. Gerber and Jane Zavisca. 2016. Does Russian Propaganda Work? The Washington Quarterly 39, 2 (apr 2016), 79--98.
[28]
Gf. 2019. Onet.pl: deputy justice minister behind campaign to discredit judges. https://tinyurl.com/y4zrg5uy
[29]
Zachary K. Goldman. 2015. Terrorism 2.0? New Challenges in Cyberspace. Georgetown Journal of International Affairs (2015).
[30]
Maja Golf-Papez and Ekant Veer. 2017. Don't feed the trolling: rethinking how online trolling is being defined and combated. Journal of Marketing Management 33, 15-16 (oct 2017), 1336--1354.
[31]
Robert Gorwa. 2017. Computational Propaganda in Poland: False Amplifiers and the Digital Public Sphere. (2017). https://tinyurl.com/yxy3zy33
[32]
Claire Hardaker. 2013. "Uh. . . . not to be nitpicky,but... the past tense of drag is dragged, not drug.": An overview of trolling strategies. Journal of Language Aggression and Conflict 1, 1 (2013), 58--86.
[33]
Susan Herring, Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab. 2002. Searching for Safety Online: Managing "Trolling" in a Feminist Forum. The Information Society 18, 5 (oct 2002), 371--384. https://tinyurl.com/y85pwmgh
[34]
Scott Jasper. 2015. Deterring Malicious Behavior in Cyberspace. Strategic Studies Quarterly 9, 1 (2015), 60--85.
[35]
Jordon Tomblin Jeff Shantz. 2013. Cyber Disobedience: Re-Presenting Online Anarchy. Hants: Zero Books.
[36]
Terho Jussinoja. 2018. Life-Cycle Of Internet Trolls. Ph.D. Dissertation. University Of Jyväskylä. https://tinyurl.com/t4emeoj
[37]
Jan Kallberg and Bhavani Thuraisingham. 2013. State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks. IT Professional 15, 3 (may 2013), 32--35.
[38]
Kaspersky. [n. d.]. What Is an Advanced Persistent Threat (APT)? https://tinyurl.com/v6apbfs
[39]
John J. Klein. 2015. Deterring and Dissuading Cyberterrorism. Journal of Strategic Security 8, 4 (2015). https://tinyurl.com/tdb7jql
[40]
Rafał Kozik and Michał Choraś. 2018. Protecting the application layer in the public domain with machine learning methods. Logic Journal of the IGPL 27, 2 (09 2018), 149--159.
[41]
M. Lord Kristin and Travis Sharp (Eds.). 2011. America's Cyber Future Security and Prosperity in the Information Age volume ii.
[42]
Dan Lohrman. 2015. Hacking For Cause: Today's Growing Cyber Security Trend. (2015). https://tinyurl.com/t8upq35
[43]
Peter Ludlow. 2001. Crypto Anarchy, Cyberstates, and Pirate Utopias. MIT Press, Cambridge, MA.
[44]
Paula Magal. 2019. Who are the hacktivists? (2019). https://cyberseries.io/2019/01/21/who-are-the-hacktivists/
[45]
Steve Mansfield-Devine. 2011. Hacktivism: assessing the damage. Network Security 2011, 8 (aug 2011), 5--13.
[46]
Marc Wilczek. 2019. Cybersicherheit: Hartes Jahr für die IT-Security-Teams der Banken - und Entwarnung ist nicht in Sicht. (2019).
[47]
Jane McCallion. 2017. Anti-Isis hacktivists compromise terrorists' website | IT PRO. ITPro (2017). https://tinyurl.com/t2j7zjw
[48]
Julia McCoy. 2019. 7 Effective Tactics to Defeat Internet Trolls.
[49]
MI5. 2019. Cyber. https://www.mi5.gov.uk/cyber
[50]
K Mshvidobadze. 2011. State-sponsored Cyber Terrorism: Georgia's Experience. Technical Report.
[51]
Kate O'Flaherty. 2018. Cyber Warfare: The Threat From Nation States. (2018).
[52]
David Ohlin, Kevin Govern, and Claire Finkelstein Oxford. 2015. Nicolò Bussolati "The Rise of Non-State Actors in Cyberwarfare". (2015).
[53]
Gordon Pennycook and David G. Rand. 2017. Who Falls for Fake News? The Roles of Analytic Thinking, Motivated Reasoning, Political Ideology, and Bullshit Receptivity. SSRN Electronic Journal (2017).
[54]
Ray Pompon. 2017. Doxing, DoS, and Defacement: Today's Mainstream Hacktivism Tools. Application Threat Intelligence (2017).
[55]
Raytheon. 2019. A field guide to hackers. (2019).
[56]
Imogen Richards and Mark A. Wood. 2018. Hacktivists against terrorism: A cultural criminological analysis of Anonymous' anti- IS campaigns. International Journal of Cyber Criminology 12, 1 (2018), 187--205.
[57]
Claudio Sandmeier. 2018. Cybercrime Akteure. (2018).
[58]
Marietje Schaake. 2018. A Rules-Based Order to Keep the Internet Open and Secure. Georgetown Journal of International Affairs (2018).
[59]
Tom Sear and Michael Jensen. 2018. Russian trolls targeted Australian voters on Twitter via #auspol and #MH17. (2018).
[60]
Canadian Centre for Cyber Security. 2018. Cyber Threat and Cyber Threat Actors. https://tinyurl.com/trozjub
[61]
Pnina Shachaf and Noriko Hara. 2010. Beyond vandalism: Wikipedia trolls. Journal of Information Science 36, 3 (jun 2010), 357--370.
[62]
Elisabeth Siegel. 2017. Cyber-defense Strategies for Contending with Non-state Actors: A Review and Assessment of Existing Proposals. The Yale Review of International Studies (2017). http://yris.yira.org/comments/2214
[63]
Johan Sigholm. 2016. Non-State Actors in Cyberspace Operations. Journal of Military Studies 4, 1 (2016), 1--37.
[64]
Tom Sorell. 2015. Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous. Journal of Human Rights Practice 7, 3 (2015), 391--410.
[65]
Jimmy Sproles and Will Byars. 1998. Cyber-terrorism. (1998).
[66]
Bae Systems. [n. d.]. The Nation State Actor; Cyber threats, methods and motivations. ([n. d.]). https://tinyurl.com/s4pdlv4
[67]
Ai Lei Tao. 2017. Nation-state actors responsible for most cyber attacks. (2017). https://tinyurl.com/v4jcgzq
[68]
Catherine A. Theohary and John W. Rollins. 2015. Cyberwarfare and Cyberterrorism: In Brief. Technical Report.
[69]
website. [n. d.]. Proactive Defense: Understanding the 4 Main Threat Actor Types. https://www.recordedfuture.com/threat-actor-types/
[70]
website. [n. d.]. Virtual Sit-In. https://tinyurl.com/whwulm4
[71]
Phil Williams and Dighton Fiddner. 2016. Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition. Strategic Studies Institute (U.S.).
[72]
Davey Winder. 2018. Boundaries between nation-state and criminal actors more blurred than ever. SCMagazineUK.com (2018). https://tinyurl.com/ukudmcv

Cited By

View all
  • (2024)Introducing a Multi-Perspective xAI Tool for Better Model ExplainabilityProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670905(1-8)Online publication date: 30-Jul-2024
  • (2024)Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime ForensicsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670880(1-8)Online publication date: 30-Jul-2024
  • (2024)The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT NetworksMobile Internet Security10.1007/978-981-97-4465-7_14(197-208)Online publication date: 12-Jul-2024
  • Show More Cited By
  1. Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
    August 2020
    1073 pages
    ISBN:9781450388337
    DOI:10.1145/3407023
    • Program Chairs:
    • Melanie Volkamer,
    • Christian Wressnegger
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 August 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cyber threat
    2. cyberspace
    3. cyberspace actors
    4. cyberterrorists
    5. hacktivists
    6. nation-state actors
    7. trolls

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ARES 2020

    Acceptance Rates

    Overall Acceptance Rate 228 of 451 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)74
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Introducing a Multi-Perspective xAI Tool for Better Model ExplainabilityProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670905(1-8)Online publication date: 30-Jul-2024
    • (2024)Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime ForensicsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670880(1-8)Online publication date: 30-Jul-2024
    • (2024)The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT NetworksMobile Internet Security10.1007/978-981-97-4465-7_14(197-208)Online publication date: 12-Jul-2024
    • (2023)Siber Güvenlik Araştırmalarına Küresel Bir Bakış: Yayın Trendleri ve Araştırma YönelimleriA Global Perspective of Cybersecurity Research: Publication Trends and Research DirectionsBilişim Teknolojileri Dergisi10.17671/gazibtd.129178316:3(221-235)Online publication date: 31-Jul-2023
    • (2023)Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection2023 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN54540.2023.10191496(1-8)Online publication date: 18-Jun-2023
    • (2023)Analyzing the Attack Pattern of Brute Force Attack on SSH Port2023 International Conference on Information Technology and Computing (ICITCOM)10.1109/ICITCOM60176.2023.10441929(67-72)Online publication date: 1-Dec-2023
    • (2023)How to secure the IoT-based surveillance systems in an ELEGANT way2023 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR57506.2023.10224938(636-640)Online publication date: 31-Jul-2023
    • (2023)Digital fingerprinting for identifying malicious collusive groups on TwitterJournal of Cybersecurity10.1093/cybsec/tyad0149:1Online publication date: 10-Aug-2023
    • (2023)Fake News and Threats to IoT—The Crucial Aspects of Cyberspace in the Times of CyberwarResearch and Innovation Forum 202210.1007/978-3-031-19560-0_3(31-38)Online publication date: 15-Mar-2023
    • (2022)The cybersecurity-related ethical issues of cloud technology and how to avoid themProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544456(1-7)Online publication date: 23-Aug-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media