首页 > 最新文献

2015 First International Conference on Anti-Cybercrime (ICACC)最新文献

英文 中文
Forensic investigation framework for VoIP protocol VoIP协议的法医调查框架
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351935
T. Manesh, S. M. Abd El-atty, M. Sha, B. Brijith, K. Vivekanandan
The deployment of Voice over Internet Protocol (VoIP) in place of traditional communication facilities has helped in huge reduction in operating costs, as well as enabled adoption of next generation communication services-based IP. At the same time, cyber criminals have also started intercepting environment and creating challenges for law enforcement system in any Country. At this instant, we propose a framework for the forensic analysis of the VoIP traffic over the network. This includes identifying and analyzing of network patterns of VoIP- SIP which is used for the setting up a session for the communication, and VoIP-RTP which is used for sending the data. Our network forensic investigation framework also focus on developing an efficient packet reordering and reconstruction algorithm for tracing the malicious users involved in conversation. The proposed framework is based on network forensics which can be used for content level observation of VoIP and regenerate original malicious content or session between malicious users for their prosecution in the court.
采用互联网通讯协议语音(VoIP)取代传统通讯设施,有助大幅降低营运成本,并可采用下一代通讯服务IP。与此同时,网络犯罪分子也开始拦截环境,给任何国家的执法系统带来挑战。在此,我们提出了一个网络上VoIP流量取证分析的框架。这包括识别和分析VoIP的网络模式——用于建立通信会话的SIP和用于发送数据的VoIP- rtp。我们的网络取证调查框架也专注于开发一种有效的数据包重新排序和重建算法,以跟踪涉及会话的恶意用户。该框架以网络取证为基础,可用于VoIP的内容级观察,并可再生恶意用户之间的原始恶意内容或会话,以供法院起诉。
{"title":"Forensic investigation framework for VoIP protocol","authors":"T. Manesh, S. M. Abd El-atty, M. Sha, B. Brijith, K. Vivekanandan","doi":"10.1109/ANTI-CYBERCRIME.2015.7351935","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351935","url":null,"abstract":"The deployment of Voice over Internet Protocol (VoIP) in place of traditional communication facilities has helped in huge reduction in operating costs, as well as enabled adoption of next generation communication services-based IP. At the same time, cyber criminals have also started intercepting environment and creating challenges for law enforcement system in any Country. At this instant, we propose a framework for the forensic analysis of the VoIP traffic over the network. This includes identifying and analyzing of network patterns of VoIP- SIP which is used for the setting up a session for the communication, and VoIP-RTP which is used for sending the data. Our network forensic investigation framework also focus on developing an efficient packet reordering and reconstruction algorithm for tracing the malicious users involved in conversation. The proposed framework is based on network forensics which can be used for content level observation of VoIP and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing cognitive radio enabled smart grid systems against cyber attacks 保护认知无线电智能电网系统免受网络攻击
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351938
M. Basharat, W. Ejaz, Syed Hassan Ahmed
Recently cognitive radio technology gets attention to enhance the performance of smart grid communication networks. In this paper, we present a cognitive radio enabled smart grid architecture. We then discuss major cyber security challenges in smart grid deployment and additional challenges introduced by cognitive radio technology. Spectrum sensing is one of the important aspect for opportunistic spectrum access in cognitive radio enabled smart grid networks. Cooperative spectrum sensing can improve the sensing performance in which multiple cognitive radio users cooperate to sense primary user bands. However, cooperative spectrum sensing is vulnerable to incumbent emulation and spectrum sensing data falsification (SSDF) attacks. Thus, we propose a two-stage scheme for defense against SSDF attacks. Simulation results show that the proposed two-stage scheme can identify and exclude the attackers accurately.
认知无线电技术是提高智能电网通信网络性能的重要技术之一。在本文中,我们提出了一种认知无线电智能电网架构。然后,我们讨论了智能电网部署中的主要网络安全挑战以及认知无线电技术带来的其他挑战。频谱感知是认知无线电智能电网中机会频谱接入的一个重要方面。协同频谱感知可以提高多个认知无线电用户协同感知主用户频段的感知性能。然而,协同频谱感知容易受到在位仿真和频谱感知数据伪造(SSDF)攻击。因此,我们提出了一个两阶段防御SSDF攻击的方案。仿真结果表明,该方案可以准确地识别和排除攻击者。
{"title":"Securing cognitive radio enabled smart grid systems against cyber attacks","authors":"M. Basharat, W. Ejaz, Syed Hassan Ahmed","doi":"10.1109/ANTI-CYBERCRIME.2015.7351938","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351938","url":null,"abstract":"Recently cognitive radio technology gets attention to enhance the performance of smart grid communication networks. In this paper, we present a cognitive radio enabled smart grid architecture. We then discuss major cyber security challenges in smart grid deployment and additional challenges introduced by cognitive radio technology. Spectrum sensing is one of the important aspect for opportunistic spectrum access in cognitive radio enabled smart grid networks. Cooperative spectrum sensing can improve the sensing performance in which multiple cognitive radio users cooperate to sense primary user bands. However, cooperative spectrum sensing is vulnerable to incumbent emulation and spectrum sensing data falsification (SSDF) attacks. Thus, we propose a two-stage scheme for defense against SSDF attacks. Simulation results show that the proposed two-stage scheme can identify and exclude the attackers accurately.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117225264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Building adaptive defense against cybercrimes using real-time data mining 利用实时数据挖掘构建针对网络犯罪的自适应防御
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351949
Baber Majid Bhatti, N. Sami
In today's fast changing world, cybercrimes are growing at perturbing pace. At the very definition of it, cybercrimes get engendered by capitalizing on threats and exploitation of vulnerabilities. However, recent history reveals that such crimes often come with surprises and seldom follow the trends. This puts the defense systems behind in the race, because of their inability to identify new patters of cybercrime and to ameliorate to the required levels of security. This paper visualizes the empowerment of security systems through real-time data mining by the virtue of which these systems will be able to dynamically identify patterns of cybercrimes. This will help those security systems stepping up their defense capabilities, while adapting to the required levels posed by newly germinating patterns. In order to confine within scope of this paper, the application of this approach is being discussed in the context of selected scenarios ofcybercrime.
在当今瞬息万变的世界,网络犯罪正以令人不安的速度增长。就其定义而言,网络犯罪是通过利用威胁和漏洞而产生的。然而,最近的历史表明,这类犯罪往往出人意料,很少遵循趋势。这使得防御系统在竞争中落后,因为它们无法识别网络犯罪的新模式,也无法改善到所需的安全水平。本文通过实时数据挖掘可视化安全系统的授权,这些系统将能够动态识别网络犯罪的模式。这将有助于这些安全系统加强其防御能力,同时适应新出现的模式所要求的水平。为了限制在本文的范围内,这种方法的应用是在选定的网络犯罪场景的背景下进行讨论。
{"title":"Building adaptive defense against cybercrimes using real-time data mining","authors":"Baber Majid Bhatti, N. Sami","doi":"10.1109/ANTI-CYBERCRIME.2015.7351949","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351949","url":null,"abstract":"In today's fast changing world, cybercrimes are growing at perturbing pace. At the very definition of it, cybercrimes get engendered by capitalizing on threats and exploitation of vulnerabilities. However, recent history reveals that such crimes often come with surprises and seldom follow the trends. This puts the defense systems behind in the race, because of their inability to identify new patters of cybercrime and to ameliorate to the required levels of security. This paper visualizes the empowerment of security systems through real-time data mining by the virtue of which these systems will be able to dynamically identify patterns of cybercrimes. This will help those security systems stepping up their defense capabilities, while adapting to the required levels posed by newly germinating patterns. In order to confine within scope of this paper, the application of this approach is being discussed in the context of selected scenarios ofcybercrime.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127099266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pakistan and cyber crimes: Problems and preventions 巴基斯坦和网络犯罪:问题和预防
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351951
Sultan Ullah, Muhammad Amir, Mudasser A. Khan, Hamid Asmat, K. Habib
The growth of Internet in Pakistan is exceptional; it reached to the heights of popularity for an ever changing medium of information and communication in a major conservative society. This brings freedom of expression, communication and information across the country which struggled to provide free speech and information access to its people. The Internet penetration is increasing very rapidly; it is very important to observe the impact of it on the society; especially when the government is constantly trying to formulate the regulation for controlling the cyber space. A well regulated cyber space leads to the expansion of information technology services speedily. This paper focuses on the prevailing development of governance policies for cyber space and defies among the agencies and information technology venders. Moreover, the case study of national bank of Pakistan and other cyber crime survey shows that a lot of law making is needed in order to reduce the chances of cyber crime.
巴基斯坦的互联网发展非常迅速;在一个主要的保守社会中,作为一种不断变化的信息和交流媒介,它达到了受欢迎的高度。这使全国各地的言论、交流和信息自由得以实现,而这个国家一直在努力为其人民提供言论自由和信息获取。互联网的普及速度非常快;观察它对社会的影响是非常重要的;特别是当政府不断试图制定控制网络空间的法规时。网络空间规范,信息技术服务迅速扩展。本文着重分析了网络空间治理政策的发展现状,以及机构和信息技术供应商之间的矛盾。此外,巴基斯坦国家银行和其他网络犯罪调查的案例研究表明,为了减少网络犯罪的机会,需要大量的法律制定。
{"title":"Pakistan and cyber crimes: Problems and preventions","authors":"Sultan Ullah, Muhammad Amir, Mudasser A. Khan, Hamid Asmat, K. Habib","doi":"10.1109/ANTI-CYBERCRIME.2015.7351951","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351951","url":null,"abstract":"The growth of Internet in Pakistan is exceptional; it reached to the heights of popularity for an ever changing medium of information and communication in a major conservative society. This brings freedom of expression, communication and information across the country which struggled to provide free speech and information access to its people. The Internet penetration is increasing very rapidly; it is very important to observe the impact of it on the society; especially when the government is constantly trying to formulate the regulation for controlling the cyber space. A well regulated cyber space leads to the expansion of information technology services speedily. This paper focuses on the prevailing development of governance policies for cyber space and defies among the agencies and information technology venders. Moreover, the case study of national bank of Pakistan and other cyber crime survey shows that a lot of law making is needed in order to reduce the chances of cyber crime.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward an multidisciplinary curriculum in cyberscience 迈向网络科学的多学科课程
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351958
Andrew T. M. Phillips, J. Impagliazzo
This conference presentation describes a process for developing a multidisciplinary curriculum in cyberscience. The process presented is a broad-based approach designed to support a four-year undergraduate cyberscience curriculum applicable to diverse institutions of higher learning.
本次会议报告描述了在网络科学中开发多学科课程的过程。提出的过程是一个基础广泛的方法,旨在支持适用于不同高等院校的四年制本科网络科学课程。
{"title":"Toward an multidisciplinary curriculum in cyberscience","authors":"Andrew T. M. Phillips, J. Impagliazzo","doi":"10.1109/ANTI-CYBERCRIME.2015.7351958","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351958","url":null,"abstract":"This conference presentation describes a process for developing a multidisciplinary curriculum in cyberscience. The process presented is a broad-based approach designed to support a four-year undergraduate cyberscience curriculum applicable to diverse institutions of higher learning.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of cyber attacks based on rough set theory 基于粗糙集理论的网络攻击分类
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351952
Adnan Amin, S. Anwar, A. Adnan, Muhammad Aamir Khan, Zafar Iqbal
The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier's accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.
通过电脑、智能手机和其他电子设备将现代社会连接在一起的电信和信息网络的使用迅速增加,导致了安全威胁和网络犯罪活动。这些网络犯罪活动最终导致CC攻击分类成为网络安全领域的一个严重问题,而机器学习在入侵分类中得到了广泛的研究领域,其重点是提高分类器的准确率或提高数据挖掘模型的性能。本研究是利用粗糙集理论(RST)这一基于规则的决策方法提取入侵攻击分类规则的又一尝试。在公开数据上进行实验,探索遗传算法、覆盖算法、LEM2和穷举算法四种不同算法的性能。可以观察到,与其他提到的规则生成算法相比,基于遗传算法的规则生成RST分类产生了最好的性能。此外,通过将该方法应用于入侵攻击的公开数据集,结果表明该方法可以全面预测所有入侵攻击,并为安全工程师或开发人员提供预先的有用信息,以便进行授权操作。
{"title":"Classification of cyber attacks based on rough set theory","authors":"Adnan Amin, S. Anwar, A. Adnan, Muhammad Aamir Khan, Zafar Iqbal","doi":"10.1109/ANTI-CYBERCRIME.2015.7351952","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351952","url":null,"abstract":"The rapidly rising usage of telecommunication and information networks which inter-connect modern society through computers, smart phones and other electronic devices has led to security threats and cyber-crimes (CC) activities. These cybercrime activities has ultimately resulted in CC attack classification as a serious problem in network security domain while machine learning has been subjected to extensive research area in intrusion classification with emphasis on improving the rate of classifier's accuracy or improving the data mining model performance. This study is another attempt, using rough set theory (RST), a rule based decision making approach to extract rules for intrusion attacks classification. Experiments were performed on publicly available data to explore the performance of four different algorithms e.g. genetic algorithm, covering algorithm, LEM2 and Exhaustive algorithms. It is observed that RST classification based on genetic algorithm for rules generation yields best performance as compared to other mentioned rules generation algorithms. Moreover, by applying the proposed technique on publicly available dataset about intrusion attacks, the results show that the proposed approach can fully predict all intrusion attacks and also provides prior useful information to the security engineers or developers to conduct a mandating action.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124879541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Discarded hard disks — A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk 丢弃的硬盘——网络罪犯的宝库:从丢弃的硬盘中恢复敏感数据的案例研究
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351956
Saad Zafar, Muhammad Babar Tiwana
The modern malware poses serious security threats because of its evolved capability of using staged and persistent attack while remaining undetected over a long period of time to perform a number of malicious activities. The challenge for malicious actors is to gain initial control of the victim's machine by bypassing all the security controls. The most favored bait often used by attackers is to deceive users through a trusting or interesting email containing a malicious attachment or a malicious link. To make the email credible and interesting the cybercriminals often perform reconnaissance activities to find background information on the potential target. To this end, the value of information found on the discarded or stolen storage devices is often underestimated or ignored. In this paper, we present the partial results of analysis of one such hard disk that was purchased from the open market. The data found on the disk contained highly sensitive personal and organizational data. The results from the case study will be useful in not only understanding the involved risk but also creating awareness of related threats.
现代恶意软件由于其不断发展的使用分阶段和持续攻击的能力,同时在很长一段时间内不被发现,执行许多恶意活动,从而构成严重的安全威胁。恶意行为者面临的挑战是通过绕过所有安全控制来获得对受害者机器的初始控制。攻击者最喜欢使用的诱饵是通过包含恶意附件或恶意链接的可信或有趣的电子邮件来欺骗用户。为了使电子邮件可信和有趣,网络犯罪分子经常进行侦察活动,以找到潜在目标的背景信息。为此,在丢弃或被盗的存储设备上发现的信息的价值往往被低估或忽视。在本文中,我们提出了从公开市场上购买的一个这样的硬盘的部分分析结果。在磁盘上发现的数据包含高度敏感的个人和组织数据。案例研究的结果不仅有助于理解所涉及的风险,而且有助于提高对相关威胁的认识。
{"title":"Discarded hard disks — A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk","authors":"Saad Zafar, Muhammad Babar Tiwana","doi":"10.1109/ANTI-CYBERCRIME.2015.7351956","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351956","url":null,"abstract":"The modern malware poses serious security threats because of its evolved capability of using staged and persistent attack while remaining undetected over a long period of time to perform a number of malicious activities. The challenge for malicious actors is to gain initial control of the victim's machine by bypassing all the security controls. The most favored bait often used by attackers is to deceive users through a trusting or interesting email containing a malicious attachment or a malicious link. To make the email credible and interesting the cybercriminals often perform reconnaissance activities to find background information on the potential target. To this end, the value of information found on the discarded or stolen storage devices is often underestimated or ignored. In this paper, we present the partial results of analysis of one such hard disk that was purchased from the open market. The data found on the disk contained highly sensitive personal and organizational data. The results from the case study will be useful in not only understanding the involved risk but also creating awareness of related threats.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberstalking: An international crime [IEEE SSIT special lecture] 网络跟踪:一种国际犯罪[IEEE SSIT专题讲座]
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351957
Laura Jacob
Participants attending this special lecture will learn why current laws prohibiting cyberstalking are difficult to enforce and how an additional protocol to the Budapest Convention could help.
参加这次特别讲座的与会者将了解为什么禁止网络跟踪的现行法律难以执行,以及《布达佩斯公约》的附加议定书如何能有所帮助。
{"title":"Cyberstalking: An international crime [IEEE SSIT special lecture]","authors":"Laura Jacob","doi":"10.1109/ANTI-CYBERCRIME.2015.7351957","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351957","url":null,"abstract":"Participants attending this special lecture will learn why current laws prohibiting cyberstalking are difficult to enforce and how an additional protocol to the Budapest Convention could help.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128285877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Website fingerprinting as a cybercrime investigation model: Role and challenges 网站指纹作为网络犯罪侦查模式:作用与挑战
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351934
Taher Ahmed Ghaleb
The mass-production of online websites is one of the most confrontations of detecting cybercriminal activities. Monitoring the construction or visitation of such websites is somewhat unsophisticated process if it relies on filtering the URL addresses alone, like Proxy. However, user online interactions can be concealed if passed through security protocols or anonymity networks, like Tor. Nowadays, Tor has been widely used to conceal website addresses, web page contents, user actions, and user anonymity. On the other hand, website traffic analysis and fingerprinting techniques endeavor to break such privacy by revealing user actions and anonymity. Basically, this is considered as a negative behavior. However, in this paper, we study how fingerprinting techniques can positively be adapted by Internet Service Providers to be used against Cybercrime activities. In other words, fingerprinting techniques can play a vital role for investigating and mitigating cybercrimes. We present several fingerprinting techniques and countermeasures from a cybercrime point of view. Then, we (1) illustrate how fingerprinting techniques can be applied as cybercrime investigation models, and (2) discuss the expected challenges of such application.
网络网站的大量生产是侦查网络犯罪活动的最大难题之一。监控这些网站的建设或访问是一个简单的过程,如果它只依赖于过滤URL地址,就像代理一样。然而,如果通过安全协议或匿名网络(如Tor),用户在线交互可以被隐藏。如今,Tor已被广泛用于隐藏网站地址、网页内容、用户操作和用户匿名。另一方面,网站流量分析和指纹技术试图通过揭示用户行为和匿名性来打破这种隐私。基本上,这被认为是一种消极行为。然而,在本文中,我们研究了指纹识别技术如何被互联网服务提供商积极地应用于对抗网络犯罪活动。换句话说,指纹识别技术可以在调查和减轻网络犯罪方面发挥至关重要的作用。我们从网络犯罪的角度提出了几种指纹识别技术和对策。然后,我们(1)说明指纹技术如何应用于网络犯罪调查模型,(2)讨论这种应用的预期挑战。
{"title":"Website fingerprinting as a cybercrime investigation model: Role and challenges","authors":"Taher Ahmed Ghaleb","doi":"10.1109/ANTI-CYBERCRIME.2015.7351934","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351934","url":null,"abstract":"The mass-production of online websites is one of the most confrontations of detecting cybercriminal activities. Monitoring the construction or visitation of such websites is somewhat unsophisticated process if it relies on filtering the URL addresses alone, like Proxy. However, user online interactions can be concealed if passed through security protocols or anonymity networks, like Tor. Nowadays, Tor has been widely used to conceal website addresses, web page contents, user actions, and user anonymity. On the other hand, website traffic analysis and fingerprinting techniques endeavor to break such privacy by revealing user actions and anonymity. Basically, this is considered as a negative behavior. However, in this paper, we study how fingerprinting techniques can positively be adapted by Internet Service Providers to be used against Cybercrime activities. In other words, fingerprinting techniques can play a vital role for investigating and mitigating cybercrimes. We present several fingerprinting techniques and countermeasures from a cybercrime point of view. Then, we (1) illustrate how fingerprinting techniques can be applied as cybercrime investigation models, and (2) discuss the expected challenges of such application.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security evaluation of Saudi Arabia's websites using open source tools 使用开源工具对沙特阿拉伯网站进行安全评估
Pub Date : 2015-12-10 DOI: 10.1109/ANTI-CYBERCRIME.2015.7351928
Mohammed S. Al-Sanea, Ahmad A. Al-Daraiseh
Using e-services in Saudi Arabia is growing. Using such services offers a wide range of benefits and makes people's life easier. However, the development and the deployment of these e-services on the Internet increase the likelihood of exposure to cyber-attacks. Attackers take advantage of vulnerabilities in these e-services. Vulnerabilities arise as a result of weaknesses in the programming, miss-configuration or lack of updates. It is unfortunate that only little effort is done to evaluate the security posture of Saudi Arabia's websites. In this paper, 150 Financial, Academic, Governmental and commercial organizations websites were assessed using open source tools. In addition, a comparison between governmental and commercial websites was done based on the numbers of vulnerabilities found. The results show that Saudi Arabia's websites suffer from high, medium and low impact vulnerabilities. For example; 17.5% of websites are vulnerable to SQL injection, 13.5% are vulnerable to Shell injection, and 61% are vulnerable to Clickjacking. Finally, the evaluation showed that commercial websites are more secure than governmental websites.
沙特阿拉伯使用电子服务的人数正在增长。使用这些服务提供了广泛的好处,使人们的生活更轻松。然而,这些电子服务在互联网上的发展和部署增加了遭受网络攻击的可能性。攻击者利用这些电子服务中的漏洞。由于编程中的弱点、配置错误或缺乏更新,会出现漏洞。不幸的是,在评估沙特阿拉伯网站的安全状况方面,几乎没有什么努力。本文使用开源工具对150个金融、学术、政府和商业组织的网站进行了评估。此外,还根据发现的漏洞数量对政府网站和商业网站进行了比较。结果表明,沙特阿拉伯的网站存在高、中、低影响漏洞。例如;17.5%的网站易受SQL注入攻击,13.5%的网站易受Shell注入攻击,61%的网站易受点击劫持攻击。最后,评价表明,商业网站比政府网站更安全。
{"title":"Security evaluation of Saudi Arabia's websites using open source tools","authors":"Mohammed S. Al-Sanea, Ahmad A. Al-Daraiseh","doi":"10.1109/ANTI-CYBERCRIME.2015.7351928","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351928","url":null,"abstract":"Using e-services in Saudi Arabia is growing. Using such services offers a wide range of benefits and makes people's life easier. However, the development and the deployment of these e-services on the Internet increase the likelihood of exposure to cyber-attacks. Attackers take advantage of vulnerabilities in these e-services. Vulnerabilities arise as a result of weaknesses in the programming, miss-configuration or lack of updates. It is unfortunate that only little effort is done to evaluate the security posture of Saudi Arabia's websites. In this paper, 150 Financial, Academic, Governmental and commercial organizations websites were assessed using open source tools. In addition, a comparison between governmental and commercial websites was done based on the numbers of vulnerabilities found. The results show that Saudi Arabia's websites suffer from high, medium and low impact vulnerabilities. For example; 17.5% of websites are vulnerable to SQL injection, 13.5% are vulnerable to Shell injection, and 61% are vulnerable to Clickjacking. Finally, the evaluation showed that commercial websites are more secure than governmental websites.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"12 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 First International Conference on Anti-Cybercrime (ICACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1