当前位置: X-MOL 学术Soc. Sci. Comput. Rev. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory
Social Science Computer Review ( IF 4.1 ) Pub Date : 2021-06-18 , DOI: 10.1177/08944393211023324
Thomas J. Holt 1 , Noah D. Turner 1 , Joshua D. Freilich 2 , Steven M. Chermak 1
Affiliation  

This study applies routine activities theory to determine whether the characteristics of jihadi-inspired web defacements in the United States vary from all other defacements performed against IP addresses hosted within the United States from 2012 to 2016. We focus on target suitability variables and use a sample of over 2.2 million defacements reported by the independent website Zone-H. We estimated a binary logistic regression model and found that jihadi cyberattacks were rare among all the defacements performed in this 5-year period. Additionally, these findings demonstrated jihadists were more likely to target organizational websites and utilized specific attack methods compared to all other defacers. We contextualize our findings and outline a number of avenues for future research.



中文翻译:

使用日常活动理论检查区分圣战相关网络攻击的特征

本研究应用常规活动理论来确定美国受圣战启发的网络篡改的特征是否与 2012 年至 2016 年针对美国境内托管的 IP 地址执行的所有其他篡改不同。我们关注目标适用性变量并使用样本独立网站 Zone-H 报告了超过 220 万次污损。我们估计了一个二元逻辑回归模型,发现在这 5 年期间执行的所有篡改中,圣战网络攻击很少见。此外,这些调查结果表明,与所有其他破坏者相比,圣战者更有可能针对组织网站并使用特定的攻击方法。我们将我们的发现结合起来,并概述了未来研究的一些途径。

更新日期:2021-06-18
down
wechat
bug