2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)最新文献

筛选
英文 中文
Vulnerability to social engineering in social networks: a proposed user-centric framework 社会网络中社会工程的脆弱性:一个以用户为中心的框架
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-11-17 DOI: 10.1109/ICCCF.2016.7740435
S. Albladi, G. Weir
{"title":"Vulnerability to social engineering in social networks: a proposed user-centric framework","authors":"S. Albladi, G. Weir","doi":"10.1109/ICCCF.2016.7740435","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740435","url":null,"abstract":"Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of potential victims. The number of social engineering attacks has risen dramatically in the past few years, causing unpleasant damage both to organizations and individuals. Yet little research has discussed social engineering in the virtual environments of social networks. One approach to counter these exploits is through research that aims to understand why people fall victim to such attacks. Previous social engineering and deception research have not satisfactory identified the factors that influence the users' ability to detect attacks. Characteristics that influence users' vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and education for those users. In this context, the present study proposes a user-centric framework to understand the user's susceptibility, relevant factors and dimensions.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Positing the problem: enhancing classification of extremist web content through textual analysis 定位问题:通过文本分析加强极端主义网络内容的分类
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-11-17 DOI: 10.1109/ICCCF.2016.7740431
G. Weir, Emanuel Dos Santos, B. Cartwright, Richard Frank
{"title":"Positing the problem: enhancing classification of extremist web content through textual analysis","authors":"G. Weir, Emanuel Dos Santos, B. Cartwright, Richard Frank","doi":"10.1109/ICCCF.2016.7740431","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740431","url":null,"abstract":"Webpages with terrorist and extremist content are key factors in the recruitment and radicalization of disaffected young adults who may then engage in terrorist activities at home or fight alongside terrorist groups abroad. This paper reports on advances in techniques for classifying data collected by the Terrorism and Extremism Network Extractor (TENE) webcrawler, a custom-written program that browses the World Wide Web, collecting vast amounts of data, retrieving the pages it visits, analyzing them, and recursively following the links out of those pages. The textual content is subjected to enhanced classification through software analysis, using the Posit textual analysis toolset, generating a detailed frequency analysis of the syntax, including multi-word units and associated part-of-speech components. Results are then deployed in a knowledge extraction process using knowledge extraction algorithms, e.g., from the WEKA system. Indications are that the use of the data enrichment through application of Posit analysis affords a greater degree of match between automatic and manual classification than previously attained. Furthermore, the incorporation and deployment of these technologies promises to provide public safety officials with techniques that can help to detect terrorist webpages, gauge the intensity of their content, discriminate between webpages that do or do not require a concerted response, and take appropriate action where warranted.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132989203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Big data and digital forensics 大数据和数字取证
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740422
O. M. Adedayo
{"title":"Big data and digital forensics","authors":"O. M. Adedayo","doi":"10.1109/ICCCF.2016.7740422","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740422","url":null,"abstract":"One of the main challenges in digital forensics is the increasing volume of data that needs to be analyzed. This problem has become even more pronounced with the emergence of big data and calls for a rethink on the way digital forensics investigations have been handled over the past years. This paper briefly discusses the challenges and needs of digital forensics in the face of the current trends and requirements of different investigations. A digital forensics analysis framework that puts into consideration the existing techniques as well as the current challenges is proposed. The purpose of the framework is to reassess the various stages of the digital forensics examination process and introduce into each stage the required techniques to enhance better collection, analysis, preservation and presentation in the face of big data and other challenges facing digital forensics.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Game private networks performance: analytical models for very-large scale simulation 游戏专用网络性能:超大规模模拟的分析模型
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740433
Gaétan Hains, Y. Khmelevsky, R. Bartlett, A. Needham
{"title":"Game private networks performance: analytical models for very-large scale simulation","authors":"Gaétan Hains, Y. Khmelevsky, R. Bartlett, A. Needham","doi":"10.1109/ICCCF.2016.7740433","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740433","url":null,"abstract":"The WTFast's Gamers Private Network (GPN®) is a client/server solution that makes online games faster. GPN® connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPN® success and runs against the vast complexity of internet-wide systems. We have built an experimental network of virtualized GPN® components so as to carefully measure the statistics of latency for distributed Minecraft games and to do so in a controlled laboratory environment. This has led to a better understanding of the coupling between parameters such as: the number of players, the subset of players that are idle or active, the volume of packets exchanged, the size of packets, latency to and from the game servers, and time-series for most of those parameters. In this paper we present a mathematical model of those system game network parameters and show how it leads to: (1) realistic simulation of each of those network or game parameters, without relying on the experimental setup; (2) very large-scale numerical simulation of the game setup so as to explore various internet-wide performance scenarios that: (a) are impossible to isolate from internet “noise” in their real environment and; (b) would require vast supercomputing resources if they were to be simulated exhaustively. We motivate all elements of our mathematical model and estimate the savings in computational costs they will bring for very large-scale simulation of the GPN®. Such simulations will improve quality of service for GPN® systems and their reliability.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129495108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security countermeasures in the cyber-world 网络世界的安全对策
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740440
Andreea Bendovschi, Ameer Al-Nemrat
{"title":"Security countermeasures in the cyber-world","authors":"Andreea Bendovschi, Ameer Al-Nemrat","doi":"10.1109/ICCCF.2016.7740440","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740440","url":null,"abstract":"Companies and individuals are becoming more dependant on technology, automated processes, the Internet of Things (IoT) and daily use of internet, mobile devices, and other tools that the technological revolution has created. But against the back-drop of rapid technological progress, cyber-threats have become a serious challenge that require immediate, continuous action. As cyber-crime poses an ever-present and growing threat, corporate and individual users of the cyber-space are constantly struggling to ensure an acceptable level of security with respect to their assets. Based on an analysis of 4,785 attacks deployed world-wide in recent years, this paper outlines the correlations and patterns identified, with the final objective of defining security countermeasures that organisations from certain business sectors could implement in order to focus their limited resources and budget on mitigating the right risks.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123818033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercriminals, cyberattacks and cybercrime 网络罪犯、网络攻击和网络犯罪
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740434
Regner Sabillon, Victor Cavaller, Jeimy Cano, Jordi Serra-Ruiz
{"title":"Cybercriminals, cyberattacks and cybercrime","authors":"Regner Sabillon, Victor Cavaller, Jeimy Cano, Jordi Serra-Ruiz","doi":"10.1109/ICCCF.2016.7740434","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740434","url":null,"abstract":"Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Linguistic analysis of lone offender manifestos 孤犯宣言的语言分析
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740427
Lisa Kaati, A. Shrestha, Katie Cohen
{"title":"Linguistic analysis of lone offender manifestos","authors":"Lisa Kaati, A. Shrestha, Katie Cohen","doi":"10.1109/ICCCF.2016.7740427","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740427","url":null,"abstract":"The Internet and social media allow people to spread their views rapidly to a large group of people. While the right to freely express one's ideas and views is a cornerstone in a democratic society, in some cases the Internet can serve as a breeding ground for violent extremism and terrorism. Hence, in order to protect democracy, effective techniques of Internet surveillance are needed. Previous research has shown that there is a connection between word use and psychological states. The text analysis tool Linguistic Inquiry and Word Count (LIWC) counts words in psychologically meaningful categories. Based on the relative frequency of words from the different categories, conclusions can be drawn about the author of for instance a blog text. In this work, we have explored the characteristics of written communication produced by ten different lone offenders prior to their engagement in targeted violence. We found eight possible indicators of the drives and emotions that preceded their attacks.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121488519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Data-driven system identification of the social network dynamics in online postings of an extremist group 数据驱动系统识别极端组织在线帖子中的社会网络动态
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740429
A. Diaz, Jongeun Choi, T. Holt, S. Chermak, Joshua D. Freilich
{"title":"Data-driven system identification of the social network dynamics in online postings of an extremist group","authors":"A. Diaz, Jongeun Choi, T. Holt, S. Chermak, Joshua D. Freilich","doi":"10.1109/ICCCF.2016.7740429","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740429","url":null,"abstract":"Terrorism research has begun to focus on the issue of radicalization, or the acceptance of ideological belief systems that lead toward violence. There has been particular attention paid to the role of the Internet in the exposure to and promotion of radical ideas. There is, however, minimal work that attempts to model the ways that messages are spread or how individual participation in radical on-line communities operates. In this paper, we present a stochastic linear system to represent the evolution of contribution to a sample of 126 threads in an on-line forum where individuals discuss radical belief systems. To estimate or predict the time-varying contributions of agents for given online-forum data, each agent's contribution has been modeled as a state variable. We then use the expectation-maximization (EM) algorithm to identify the model parameters including the adjacency matrix of the graph constructed among participating agents along with measurement and system uncertainty levels in online-postings. Our approach reveals the identified dynamical influences among agents in the time-varying shaping of the contribution in a datadriven fashion. We use the real-world data from online-postings to demonstrate the usefulness of our approach, and its application toward on-line radicalization.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electromagnetic analysis attack for a lightweight cipher PRINCE 轻量级密码PRINCE的电磁分析攻击
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740423
M. Yoshikawa, Y. Nozaki
{"title":"Electromagnetic analysis attack for a lightweight cipher PRINCE","authors":"M. Yoshikawa, Y. Nozaki","doi":"10.1109/ICCCF.2016.7740423","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740423","url":null,"abstract":"Ensuring the security of built-in apparatuses has become an important task because of advancements in Internet of Things (IoT) technology. Therefore, lightweight ciphers that are available in built-in apparatuses have attracted the attention of many researchers. However, the danger of electromagnetic analysis attacks against cryptographic circuits has been pointed out. Electromagnetic analysis attacks illegally analyze confidential information using the electromagnetic waves that are generated during the operation of a cryptographic circuit. Many studies have reported on power analysis attacks against the advanced encryption standard (AES). However, as far as we know, no study has reported on electromagnetic analysis attacks against PRINCE, which is one of the most popular lightweight ciphers. The present study proposes a method for electromagnetic analysis attacks against PRINCE in order to evaluate the tamper resistance of PRINCE. The present study also verifies the validity of the proposed method by performing an evaluation experiment using a field-programmable gate array (FPGA).","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Causes of socioeconomic cybercrime in Nigeria 尼日利亚社会经济网络犯罪的原因
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740439
S. Ibrahim
{"title":"Causes of socioeconomic cybercrime in Nigeria","authors":"S. Ibrahim","doi":"10.1109/ICCCF.2016.7740439","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740439","url":null,"abstract":"The causations of crimes that are relevant in the cyberspace concurrently impact in the physical space and vise versa. This paper aims to explore parents' perceptions of the factors that cause socioeconomic cybercrime in Nigeria. Despite a long-standing view that the juvenile offenders of today could become the hardened criminals of tomorrow, and the conclusions of a number of developmental theories on the stability of delinquency across the life course, the existing data on cybercrimes in Nigeria have principally been derived from studies involving university students. Yet, individuals' moralstandard- levels, which shape their offending capacities, are mostly developed in childhood. The empirical basis for this paper is face-to-face interviews with 17 Nigerian parents regarding children's vulnerability to involvement in cybercrime. Drawing upon qualitative data, this paper argues that a complex web of familial factors and structural forces, alongside cultural forces, explains the degree of cybercrime involvement on the part of Nigerian youths.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信