This paper explores the behaviour of malicious hacker groups operating in cyberspace and how they organize themselves in structured networks. To better understand these groups, the paper uses Social Network Analysis (SNA) to analyse the interactions and relationships among several malicious hacker groups. The study employs a tested dataset as its primary source, providing an empirical analysis of the cooperative behaviours exhibited by these groups. It found that malicious hacker groups tend to form close-knit networks where they consult, coordinate with, and assist each other in carrying out their attacks. The study also identified a “small world” phenomenon within the population of malicious actors, which suggests that these groups establish interconnected relationships to facilitate their malicious operations. The small world phenomenon indicates that the actor-groups are not only tightly connected, but they also have a small number of connections to other groups, allowing for efficient communication and coordination of their activities.

An Empirical Assessment of Hacker Groups Behaviour in Cyber-attacks: A Small World of Bad Guys

Iovanella Antonio;
2025-01-01

Abstract

This paper explores the behaviour of malicious hacker groups operating in cyberspace and how they organize themselves in structured networks. To better understand these groups, the paper uses Social Network Analysis (SNA) to analyse the interactions and relationships among several malicious hacker groups. The study employs a tested dataset as its primary source, providing an empirical analysis of the cooperative behaviours exhibited by these groups. It found that malicious hacker groups tend to form close-knit networks where they consult, coordinate with, and assist each other in carrying out their attacks. The study also identified a “small world” phenomenon within the population of malicious actors, which suggests that these groups establish interconnected relationships to facilitate their malicious operations. The small world phenomenon indicates that the actor-groups are not only tightly connected, but they also have a small number of connections to other groups, allowing for efficient communication and coordination of their activities.
2025
Cyberattacks, cybersecurity, black-hat hackers, hackers’ behavior, network analysis, Advanced Persistent Threats (APT)
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14090/13002
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
social impact