首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats 迈向进攻性网络反情报:采用以目标为中心的高级持续威胁观点
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.37
J. Sigholm, Martin Bang
Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques and knowledge of existing but yet undiscovered software vulnerabilities. Addressing the threat caused by such antagonists requires a fast and offensive Cyber Counterintelligence (CCI) process, and a more efficient inter-organizational information exchange. This paper proposes a framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data. The framework is placed within the distinct context of military intelligence, in order to achieve a holistic, offensive and target-centric view of future CCI. The main contributions offered are (i) a comprehensive process that bridges the gap between the various actors involved in CCI, (ii) an applied technical architecture to support detection and identification of data leaks emanating from cyber espionage, and (iii) deduced intelligence community requirements.
尽管目前使用的传统网络防御策略对于缓解广泛的常见威胁是必要的,但它们并不适合于防范具有高级系统利用技术和现有但尚未发现的软件漏洞知识的持久对抗者。应对这些对手造成的威胁需要一个快速和进攻性的网络反情报(CCI)过程,以及更有效的组织间信息交换。本文提出了一个基于数据挖掘、异常检测和广泛共享网络威胁数据的技术工具和技术的进攻性CCI框架。该框架被置于军事情报的独特背景下,以实现未来CCI的整体,进攻性和以目标为中心的观点。所提供的主要贡献是:(i)弥合CCI中涉及的各种行动者之间差距的综合流程,(ii)支持检测和识别网络间谍活动引起的数据泄漏的应用技术架构,以及(iii)推断出的情报界要求。
{"title":"Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats","authors":"J. Sigholm, Martin Bang","doi":"10.1109/EISIC.2013.37","DOIUrl":"https://doi.org/10.1109/EISIC.2013.37","url":null,"abstract":"Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques and knowledge of existing but yet undiscovered software vulnerabilities. Addressing the threat caused by such antagonists requires a fast and offensive Cyber Counterintelligence (CCI) process, and a more efficient inter-organizational information exchange. This paper proposes a framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data. The framework is placed within the distinct context of military intelligence, in order to achieve a holistic, offensive and target-centric view of future CCI. The main contributions offered are (i) a comprehensive process that bridges the gap between the various actors involved in CCI, (ii) an applied technical architecture to support detection and identification of data leaks emanating from cyber espionage, and (iii) deduced intelligence community requirements.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133545104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony 别对我撒谎:欺骗对声音和语言同步的影响
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.67
D. L. Tower, M. Jensen, Norah E. Dunbar, A. Elkins
Most efforts at improving deception detection involve either the examination of a suspect's behavioral and physiological cues or are aimed at improving the ability of an interviewer to distinguish between truth and deception. The research presented here employs a dyadic approach to deception detection. This is a relatively novel method which utilizes the complex interplay and mutual influence between the deceiver and the receiver by examining the relationship between interactional synchrony and deception. This field experiment uses criminal interviews of both guilty (deceptive) and innocent (truthful) suspects to explore the impact of deception on different measures of vocalic and linguistic synchrony. Preliminary results indicate that deceivers may strategically synchronize to the interviewer in an attempt to allay suspicion.
大多数提高测谎能力的努力要么涉及对嫌疑人行为和生理线索的检查,要么旨在提高采访者区分真实和欺骗的能力。这里提出的研究采用了一种二元方法来检测欺骗。这是一种比较新颖的方法,它利用欺骗者和接受者之间复杂的相互作用和相互影响,考察相互作用同步性与欺骗之间的关系。本实验采用刑事访谈的方式,对有罪(欺骗)和无辜(诚实)嫌疑人进行访谈,探讨欺骗对不同程度的语音和语言同步性的影响。初步结果表明,骗子可能会有策略地与面试官保持同步,以减轻怀疑。
{"title":"Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony","authors":"D. L. Tower, M. Jensen, Norah E. Dunbar, A. Elkins","doi":"10.1109/EISIC.2013.67","DOIUrl":"https://doi.org/10.1109/EISIC.2013.67","url":null,"abstract":"Most efforts at improving deception detection involve either the examination of a suspect's behavioral and physiological cues or are aimed at improving the ability of an interviewer to distinguish between truth and deception. The research presented here employs a dyadic approach to deception detection. This is a relatively novel method which utilizes the complex interplay and mutual influence between the deceiver and the receiver by examining the relationship between interactional synchrony and deception. This field experiment uses criminal interviews of both guilty (deceptive) and innocent (truthful) suspects to explore the impact of deception on different measures of vocalic and linguistic synchrony. Preliminary results indicate that deceivers may strategically synchronize to the interviewer in an attempt to allay suspicion.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Past, Present and Future of Text Classification 文本分类的过去、现在和未来
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.61
Niklas Zechner
Despite over a century of research, the study of text classification is still chaotic. We examine the parameters at hand, and discuss some things that have been researched, and some things that have not.
尽管经过了一个多世纪的研究,文本分类的研究仍然很混乱。我们检查手头的参数,并讨论一些已经研究过的东西,以及一些还没有研究过的东西。
{"title":"The Past, Present and Future of Text Classification","authors":"Niklas Zechner","doi":"10.1109/EISIC.2013.61","DOIUrl":"https://doi.org/10.1109/EISIC.2013.61","url":null,"abstract":"Despite over a century of research, the study of text classification is still chaotic. We examine the parameters at hand, and discuss some things that have been researched, and some things that have not.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"109 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134557985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work 智能工作中生成、构建和分析多种假设的工具
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.11
T. Gustavi, Maja Karasalo, Christian Mårtenson
In this paper, we present an analysis tool that is developed to support the process of generating and evaluating a large set of hypotheses. The computer tool is to a large extent based on two established analytical methods, Morphological Analysis and Analysis of Competing Hypotheses, and aims to facilitate the analysis by offering support for organizing and visualizing information. In particular, the tool provides support for efficient management of links between evidence and hypotheses. By linking evidence directly to elements of a morphological chart, the analyst can work directly with sets of hypotheses and thereby significantly decrease the number of manual steps necessary to complete the analysis.
在本文中,我们提出了一种分析工具,该工具是为了支持生成和评估大量假设的过程而开发的。计算机工具在很大程度上基于两种既定的分析方法,形态分析和竞争假设分析,旨在通过支持组织和可视化信息来促进分析。特别是,该工具为有效管理证据和假设之间的联系提供了支持。通过将证据直接与形态图表的元素联系起来,分析人员可以直接处理假设集,从而显著减少完成分析所需的手动步骤的数量。
{"title":"A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work","authors":"T. Gustavi, Maja Karasalo, Christian Mårtenson","doi":"10.1109/EISIC.2013.11","DOIUrl":"https://doi.org/10.1109/EISIC.2013.11","url":null,"abstract":"In this paper, we present an analysis tool that is developed to support the process of generating and evaluating a large set of hypotheses. The computer tool is to a large extent based on two established analytical methods, Morphological Analysis and Analysis of Competing Hypotheses, and aims to facilitate the analysis by offering support for organizing and visualizing information. In particular, the tool provides support for efficient management of links between evidence and hypotheses. By linking evidence directly to elements of a morphological chart, the analyst can work directly with sets of hypotheses and thereby significantly decrease the number of manual steps necessary to complete the analysis.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Effect of Personality Type on Deceptive Communication Style 人格类型对欺骗性沟通方式的影响
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.8
Tommaso Fornaciari, Fabio Celli, Massimo Poesio
It has long been hypothesized that the ability to deceive depends on personality - some personality types are `better' at deceiving in that their deception is harder to recognize. In this work, we evaluate how the pattern of personality of a speaker affects the effectiveness of machine learning models for deception detection in transcripts of oral speech. We trained models to classify as deceptive or not deceptive statements issued in Court by Italian speakers. We then used a system for automatic personality recognition to generate hypotheses about the personality of these speakers, and we clustered the subjects on the basis of their personality traits. It turned out that deception detection models perform differently depending on the patterns of personality traits which characterize the speakers. This suggests that speakers who show certain types of personality also have a communication style in which deception can be detected more, or less, easily.
长期以来,人们一直假设欺骗的能力取决于性格——有些性格类型的人更擅长欺骗,因为他们的欺骗行为更难被发现。在这项工作中,我们评估了说话人的个性模式如何影响机器学习模型在口头演讲文本中进行欺骗检测的有效性。我们训练模型将意大利语使用者在法庭上发表的陈述分为欺骗性和非欺骗性。然后,我们使用一个自动人格识别系统来生成关于这些说话者的人格的假设,并根据他们的人格特征对主题进行聚类。事实证明,欺骗检测模型的表现是不同的,这取决于说话者的个性特征。这表明,表现出某种个性的说话者也有一种沟通风格,在这种风格中,欺骗或多或少更容易被发现。
{"title":"The Effect of Personality Type on Deceptive Communication Style","authors":"Tommaso Fornaciari, Fabio Celli, Massimo Poesio","doi":"10.1109/EISIC.2013.8","DOIUrl":"https://doi.org/10.1109/EISIC.2013.8","url":null,"abstract":"It has long been hypothesized that the ability to deceive depends on personality - some personality types are `better' at deceiving in that their deception is harder to recognize. In this work, we evaluate how the pattern of personality of a speaker affects the effectiveness of machine learning models for deception detection in transcripts of oral speech. We trained models to classify as deceptive or not deceptive statements issued in Court by Italian speakers. We then used a system for automatic personality recognition to generate hypotheses about the personality of these speakers, and we clustered the subjects on the basis of their personality traits. It turned out that deception detection models perform differently depending on the patterns of personality traits which characterize the speakers. This suggests that speakers who show certain types of personality also have a communication style in which deception can be detected more, or less, easily.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior 犯罪行为趋势与模式的贝叶斯参数统计异常检测方法
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.19
A. Holst, B. Bjurling
In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used for detecting long and short term trends and anomalies in geographically tagged alarm data. We elaborate on how the detection of such deviations can be used for high-lighting suspected criminal behavior and activities. BPAD has previously been successively deployed and evaluated in several similar domains, including Maritime Domain Awareness, Train Fleet Maintenance, and Alarm filtering. Similar as for those applications, we argue in the paper that the deployment of BPAD in area of crime monitoring potentially can improve the situation awareness of criminal activities, by providing automatic detection of suspicious behaviors, and uncovering large scale patterns.
在本文中,我们描述了贝叶斯主异常检测(BPAD)如何用于检测地理标记报警数据中的长期和短期趋势和异常。我们详细阐述了如何使用这种偏差的检测来突出可疑的犯罪行为和活动。BPAD之前已经在几个类似的领域进行了部署和评估,包括海事领域感知、列车舰队维护和警报过滤。与这些应用类似,我们在论文中认为,在犯罪监测领域部署BPAD可以通过提供可疑行为的自动检测和揭示大规模模式,潜在地提高对犯罪活动的态势感知。
{"title":"A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior","authors":"A. Holst, B. Bjurling","doi":"10.1109/EISIC.2013.19","DOIUrl":"https://doi.org/10.1109/EISIC.2013.19","url":null,"abstract":"In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used for detecting long and short term trends and anomalies in geographically tagged alarm data. We elaborate on how the detection of such deviations can be used for high-lighting suspected criminal behavior and activities. BPAD has previously been successively deployed and evaluated in several similar domains, including Maritime Domain Awareness, Train Fleet Maintenance, and Alarm filtering. Similar as for those applications, we argue in the paper that the deployment of BPAD in area of crime monitoring potentially can improve the situation awareness of criminal activities, by providing automatic detection of suspicious behaviors, and uncovering large scale patterns.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
False Event Detection for Mobile Sinks in Wireless Sensor Networks 无线传感器网络中移动sink的假事件检测
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.15
Y. Sei, Akihiko Ohsuga
In large-scale sensor networks, adversaries may capture and compromise several of the sensors. Compromised nodes can be used by adversaries to generate many false messages which waste the batteries of sensor nodes and the bandwidth of the sensor network. Many works aim to detect a false event in-network even if many nodes are compromised. Certain existing methods can achieve this, but, they cannot be used in a situation where the location of the sink changes. We propose a new method that resiliently detects false messages, even when there are a large number of compromised nodes and that can handle situations where the location of the sink changes. By preloading a legitimate combination of keys (LCK) on sensor nodes before deployment, the nodes can detect false events created from false combinations of keys. Our mathematical analysis and the simulations we conducted prove the effectiveness of our method.
在大规模传感器网络中,攻击者可能会捕获并破坏多个传感器。被破坏的节点可以被攻击者利用来产生许多虚假信息,从而浪费传感器节点的电池和传感器网络的带宽。许多工作旨在检测网络中的虚假事件,即使许多节点受到损害。某些现有的方法可以实现这一点,但是,它们不能用于接收器位置发生变化的情况。我们提出了一种新方法,即使存在大量受损节点,也可以灵活地检测虚假消息,并且可以处理接收器位置发生变化的情况。通过在部署前在传感器节点上预加载合法的密钥组合(LCK),节点可以检测由错误的密钥组合创建的错误事件。数学分析和仿真结果证明了该方法的有效性。
{"title":"False Event Detection for Mobile Sinks in Wireless Sensor Networks","authors":"Y. Sei, Akihiko Ohsuga","doi":"10.1109/EISIC.2013.15","DOIUrl":"https://doi.org/10.1109/EISIC.2013.15","url":null,"abstract":"In large-scale sensor networks, adversaries may capture and compromise several of the sensors. Compromised nodes can be used by adversaries to generate many false messages which waste the batteries of sensor nodes and the bandwidth of the sensor network. Many works aim to detect a false event in-network even if many nodes are compromised. Certain existing methods can achieve this, but, they cannot be used in a situation where the location of the sink changes. We propose a new method that resiliently detects false messages, even when there are a large number of compromised nodes and that can handle situations where the location of the sink changes. By preloading a legitimate combination of keys (LCK) on sensor nodes before deployment, the nodes can detect false events created from false combinations of keys. Our mathematical analysis and the simulations we conducted prove the effectiveness of our method.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127541157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing the Border, Smartly 聪明地管理边境
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.72
Sandrine Trochu, O. Touret
Whatever the future holds in terms of new regulations and processes, the trend will be to record and secure border crossings for an increasing share of eligible passengers. In order for this trend to be derived into effective and efficient execution as well as for passengers to experience a fluent journey despite this increase of security requirements, performing an identification of passengers through a unique identifier, providing facilitated and automated checks and being capable to identify and then trace persons of interest will be needed and very valuable tracks to follow in order to achieve these objectives. The extent and pace to which these tracks will be followed and soundly articulated together will define how smartly the borders will be managed in the future.
无论在新的法规和程序方面的未来如何,趋势将是为越来越多的符合条件的乘客记录和确保过境。为了使这一趋势得到有效和高效的执行,并使乘客在安全要求增加的情况下体验流畅的旅程,通过唯一标识符对乘客进行识别,提供便利和自动的检查,并能够识别和跟踪感兴趣的人,将需要非常有价值的跟踪,以实现这些目标。这些轨道将被遵循的程度和速度,以及它们紧密结合在一起的程度和速度,将决定未来如何巧妙地管理边界。
{"title":"Managing the Border, Smartly","authors":"Sandrine Trochu, O. Touret","doi":"10.1109/EISIC.2013.72","DOIUrl":"https://doi.org/10.1109/EISIC.2013.72","url":null,"abstract":"Whatever the future holds in terms of new regulations and processes, the trend will be to record and secure border crossings for an increasing share of eligible passengers. In order for this trend to be derived into effective and efficient execution as well as for passengers to experience a fluent journey despite this increase of security requirements, performing an identification of passengers through a unique identifier, providing facilitated and automated checks and being capable to identify and then trace persons of interest will be needed and very valuable tracks to follow in order to achieve these objectives. The extent and pace to which these tracks will be followed and soundly articulated together will define how smartly the borders will be managed in the future.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Issues for the Next Generation of Criminal Network Investigation Tools 下一代犯罪网络侦查工具的问题
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.9
U. Wiil
Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.
犯罪网络调查涉及许多复杂的知识管理任务,人和软件工具在执行这些任务中起着核心作用。本文提出了未来网络犯罪侦查工具的发展方向。研究议程的灵感部分来自超文本领域关于如何构建工具来构建、可视化和管理知识的先前研究,部分来自情报和安全信息学领域关于犯罪网络调查工具支持的先前研究。以Crime Fighter为例,探讨当前犯罪网络调查工具的局限性,并提出未来工具需要解决的问题。
{"title":"Issues for the Next Generation of Criminal Network Investigation Tools","authors":"U. Wiil","doi":"10.1109/EISIC.2013.9","DOIUrl":"https://doi.org/10.1109/EISIC.2013.9","url":null,"abstract":"Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit 从Android操作系统设备的取证数据恢复:一个开源工具包
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.58
Patrick Dibb, Mohammad Hammoudeh
The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases. Data can include not just call history or text messages but, as mobile phones become more smart, it can also include internet web pages, chat data, social media files and other application data. In this paper we present an open-source toolkit has been developed to improve workflow for forensic analysts and to aid Android OS mobile phone forensics. This toolkit has been designed to automatically extract and handle all data extracted from the devices so that vital intelligence can be searched and identified quickly, accurately and efficiently. This paper describes and presents the features of this toolkit.
从移动电话中恢复数据是一个非常专业和不断发展的领域,可以为刑事案件的检控提供相当大的协助。数据不仅包括通话记录或短信,随着手机变得越来越智能,它还可以包括互联网网页、聊天数据、社交媒体文件和其他应用程序数据。在本文中,我们提出了一个开源工具包,以改善法医分析的工作流程,并帮助Android操作系统手机取证。该工具包旨在自动提取和处理从设备中提取的所有数据,以便快速,准确和有效地搜索和识别重要情报。本文描述并展示了该工具包的特性。
{"title":"Forensic Data Recovery from Android OS Devices: An Open Source Toolkit","authors":"Patrick Dibb, Mohammad Hammoudeh","doi":"10.1109/EISIC.2013.58","DOIUrl":"https://doi.org/10.1109/EISIC.2013.58","url":null,"abstract":"The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases. Data can include not just call history or text messages but, as mobile phones become more smart, it can also include internet web pages, chat data, social media files and other application data. In this paper we present an open-source toolkit has been developed to improve workflow for forensic analysts and to aid Android OS mobile phone forensics. This toolkit has been designed to automatically extract and handle all data extracted from the devices so that vital intelligence can be searched and identified quickly, accurately and efficiently. This paper describes and presents the features of this toolkit.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131856450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1