首页 > 最新文献

2013 European Intelligence and Security Informatics Conference最新文献

英文 中文
Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats 迈向进攻性网络反情报:采用以目标为中心的高级持续威胁观点
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.37
J. Sigholm, Martin Bang
Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques and knowledge of existing but yet undiscovered software vulnerabilities. Addressing the threat caused by such antagonists requires a fast and offensive Cyber Counterintelligence (CCI) process, and a more efficient inter-organizational information exchange. This paper proposes a framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data. The framework is placed within the distinct context of military intelligence, in order to achieve a holistic, offensive and target-centric view of future CCI. The main contributions offered are (i) a comprehensive process that bridges the gap between the various actors involved in CCI, (ii) an applied technical architecture to support detection and identification of data leaks emanating from cyber espionage, and (iii) deduced intelligence community requirements.
尽管目前使用的传统网络防御策略对于缓解广泛的常见威胁是必要的,但它们并不适合于防范具有高级系统利用技术和现有但尚未发现的软件漏洞知识的持久对抗者。应对这些对手造成的威胁需要一个快速和进攻性的网络反情报(CCI)过程,以及更有效的组织间信息交换。本文提出了一个基于数据挖掘、异常检测和广泛共享网络威胁数据的技术工具和技术的进攻性CCI框架。该框架被置于军事情报的独特背景下,以实现未来CCI的整体,进攻性和以目标为中心的观点。所提供的主要贡献是:(i)弥合CCI中涉及的各种行动者之间差距的综合流程,(ii)支持检测和识别网络间谍活动引起的数据泄漏的应用技术架构,以及(iii)推断出的情报界要求。
{"title":"Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats","authors":"J. Sigholm, Martin Bang","doi":"10.1109/EISIC.2013.37","DOIUrl":"https://doi.org/10.1109/EISIC.2013.37","url":null,"abstract":"Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques and knowledge of existing but yet undiscovered software vulnerabilities. Addressing the threat caused by such antagonists requires a fast and offensive Cyber Counterintelligence (CCI) process, and a more efficient inter-organizational information exchange. This paper proposes a framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data. The framework is placed within the distinct context of military intelligence, in order to achieve a holistic, offensive and target-centric view of future CCI. The main contributions offered are (i) a comprehensive process that bridges the gap between the various actors involved in CCI, (ii) an applied technical architecture to support detection and identification of data leaks emanating from cyber espionage, and (iii) deduced intelligence community requirements.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133545104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Semantic Linking and Contextualization for Social Forensic Text Analysis 社会司法文本分析的语义连接和语境化
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.21
Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke
With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity and topic extraction for social media text analysis. We first describe our approach for entity linking at the 2012 Text Analysis Conference Knowledge Base Population track and then introduce the personalized tweets summarization task, where entity linking is used for semantically enriching information in a social media context.
随着社交媒体的发展,法医文本分析越来越具有挑战性,法医分析人员开始将这一信息来源纳入其实践中。在本文中,我们报告了我们最近在电子发现中与语义搜索相关的工作,并提出了将实体和主题提取用于社交媒体文本分析的方法。我们首先在2012年文本分析会议知识库人口跟踪上描述了我们的实体链接方法,然后介绍了个性化tweet摘要任务,其中实体链接用于在社交媒体上下文中丰富信息的语义。
{"title":"Semantic Linking and Contextualization for Social Forensic Text Analysis","authors":"Z. Ren, D. V. Dijk, David Graus, N. V. D. Knaap, Hans Henseler, M. de Rijke","doi":"10.1109/EISIC.2013.21","DOIUrl":"https://doi.org/10.1109/EISIC.2013.21","url":null,"abstract":"With the development of social media, forensic text analysis is becoming more and more challenging as forensic analysts have begun to include this information source in their practice. In this paper, we report on our recent work related to semantic search in e-discovery and propose the use of entity and topic extraction for social media text analysis. We first describe our approach for entity linking at the 2012 Text Analysis Conference Knowledge Base Population track and then introduce the personalized tweets summarization task, where entity linking is used for semantically enriching information in a social media context.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Browse and Search in Maritime Document Collections 浏览和搜索海事文件集
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.57
V. Dragos
This paper presents an approach to explore collection of documents in the maritime domain. Documents are reports created by experts in order to explain suspicious vessel behaviours and the collection is semantically integrated by using a domain ontology and associated instance elements. Browse and search strategies allows us to find events occurring in various maritime areas and to highlight clues explaining abnormal behaviour of vessels.
本文提出了一种探索海事领域文献收集的方法。文档是由专家创建的报告,用于解释可疑的船只行为,并且通过使用领域本体和相关实例元素将集合在语义上集成。浏览和搜索策略使我们能够发现不同海域发生的事件,并突出显示解释船舶异常行为的线索。
{"title":"Browse and Search in Maritime Document Collections","authors":"V. Dragos","doi":"10.1109/EISIC.2013.57","DOIUrl":"https://doi.org/10.1109/EISIC.2013.57","url":null,"abstract":"This paper presents an approach to explore collection of documents in the maritime domain. Documents are reports created by experts in order to explain suspicious vessel behaviours and the collection is semantically integrated by using a domain ontology and associated instance elements. Browse and search strategies allows us to find events occurring in various maritime areas and to highlight clues explaining abnormal behaviour of vessels.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work 智能工作中生成、构建和分析多种假设的工具
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.11
T. Gustavi, Maja Karasalo, Christian Mårtenson
In this paper, we present an analysis tool that is developed to support the process of generating and evaluating a large set of hypotheses. The computer tool is to a large extent based on two established analytical methods, Morphological Analysis and Analysis of Competing Hypotheses, and aims to facilitate the analysis by offering support for organizing and visualizing information. In particular, the tool provides support for efficient management of links between evidence and hypotheses. By linking evidence directly to elements of a morphological chart, the analyst can work directly with sets of hypotheses and thereby significantly decrease the number of manual steps necessary to complete the analysis.
在本文中,我们提出了一种分析工具,该工具是为了支持生成和评估大量假设的过程而开发的。计算机工具在很大程度上基于两种既定的分析方法,形态分析和竞争假设分析,旨在通过支持组织和可视化信息来促进分析。特别是,该工具为有效管理证据和假设之间的联系提供了支持。通过将证据直接与形态图表的元素联系起来,分析人员可以直接处理假设集,从而显著减少完成分析所需的手动步骤的数量。
{"title":"A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work","authors":"T. Gustavi, Maja Karasalo, Christian Mårtenson","doi":"10.1109/EISIC.2013.11","DOIUrl":"https://doi.org/10.1109/EISIC.2013.11","url":null,"abstract":"In this paper, we present an analysis tool that is developed to support the process of generating and evaluating a large set of hypotheses. The computer tool is to a large extent based on two established analytical methods, Morphological Analysis and Analysis of Competing Hypotheses, and aims to facilitate the analysis by offering support for organizing and visualizing information. In particular, the tool provides support for efficient management of links between evidence and hypotheses. By linking evidence directly to elements of a morphological chart, the analyst can work directly with sets of hypotheses and thereby significantly decrease the number of manual steps necessary to complete the analysis.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Effect of Personality Type on Deceptive Communication Style 人格类型对欺骗性沟通方式的影响
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.8
Tommaso Fornaciari, Fabio Celli, Massimo Poesio
It has long been hypothesized that the ability to deceive depends on personality - some personality types are `better' at deceiving in that their deception is harder to recognize. In this work, we evaluate how the pattern of personality of a speaker affects the effectiveness of machine learning models for deception detection in transcripts of oral speech. We trained models to classify as deceptive or not deceptive statements issued in Court by Italian speakers. We then used a system for automatic personality recognition to generate hypotheses about the personality of these speakers, and we clustered the subjects on the basis of their personality traits. It turned out that deception detection models perform differently depending on the patterns of personality traits which characterize the speakers. This suggests that speakers who show certain types of personality also have a communication style in which deception can be detected more, or less, easily.
长期以来,人们一直假设欺骗的能力取决于性格——有些性格类型的人更擅长欺骗,因为他们的欺骗行为更难被发现。在这项工作中,我们评估了说话人的个性模式如何影响机器学习模型在口头演讲文本中进行欺骗检测的有效性。我们训练模型将意大利语使用者在法庭上发表的陈述分为欺骗性和非欺骗性。然后,我们使用一个自动人格识别系统来生成关于这些说话者的人格的假设,并根据他们的人格特征对主题进行聚类。事实证明,欺骗检测模型的表现是不同的,这取决于说话者的个性特征。这表明,表现出某种个性的说话者也有一种沟通风格,在这种风格中,欺骗或多或少更容易被发现。
{"title":"The Effect of Personality Type on Deceptive Communication Style","authors":"Tommaso Fornaciari, Fabio Celli, Massimo Poesio","doi":"10.1109/EISIC.2013.8","DOIUrl":"https://doi.org/10.1109/EISIC.2013.8","url":null,"abstract":"It has long been hypothesized that the ability to deceive depends on personality - some personality types are `better' at deceiving in that their deception is harder to recognize. In this work, we evaluate how the pattern of personality of a speaker affects the effectiveness of machine learning models for deception detection in transcripts of oral speech. We trained models to classify as deceptive or not deceptive statements issued in Court by Italian speakers. We then used a system for automatic personality recognition to generate hypotheses about the personality of these speakers, and we clustered the subjects on the basis of their personality traits. It turned out that deception detection models perform differently depending on the patterns of personality traits which characterize the speakers. This suggests that speakers who show certain types of personality also have a communication style in which deception can be detected more, or less, easily.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior 犯罪行为趋势与模式的贝叶斯参数统计异常检测方法
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.19
A. Holst, B. Bjurling
In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used for detecting long and short term trends and anomalies in geographically tagged alarm data. We elaborate on how the detection of such deviations can be used for high-lighting suspected criminal behavior and activities. BPAD has previously been successively deployed and evaluated in several similar domains, including Maritime Domain Awareness, Train Fleet Maintenance, and Alarm filtering. Similar as for those applications, we argue in the paper that the deployment of BPAD in area of crime monitoring potentially can improve the situation awareness of criminal activities, by providing automatic detection of suspicious behaviors, and uncovering large scale patterns.
在本文中,我们描述了贝叶斯主异常检测(BPAD)如何用于检测地理标记报警数据中的长期和短期趋势和异常。我们详细阐述了如何使用这种偏差的检测来突出可疑的犯罪行为和活动。BPAD之前已经在几个类似的领域进行了部署和评估,包括海事领域感知、列车舰队维护和警报过滤。与这些应用类似,我们在论文中认为,在犯罪监测领域部署BPAD可以通过提供可疑行为的自动检测和揭示大规模模式,潜在地提高对犯罪活动的态势感知。
{"title":"A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior","authors":"A. Holst, B. Bjurling","doi":"10.1109/EISIC.2013.19","DOIUrl":"https://doi.org/10.1109/EISIC.2013.19","url":null,"abstract":"In this paper we describe how Bayesian Principal Anomaly Detection (BPAD) can be used for detecting long and short term trends and anomalies in geographically tagged alarm data. We elaborate on how the detection of such deviations can be used for high-lighting suspected criminal behavior and activities. BPAD has previously been successively deployed and evaluated in several similar domains, including Maritime Domain Awareness, Train Fleet Maintenance, and Alarm filtering. Similar as for those applications, we argue in the paper that the deployment of BPAD in area of crime monitoring potentially can improve the situation awareness of criminal activities, by providing automatic detection of suspicious behaviors, and uncovering large scale patterns.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
False Event Detection for Mobile Sinks in Wireless Sensor Networks 无线传感器网络中移动sink的假事件检测
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.15
Y. Sei, Akihiko Ohsuga
In large-scale sensor networks, adversaries may capture and compromise several of the sensors. Compromised nodes can be used by adversaries to generate many false messages which waste the batteries of sensor nodes and the bandwidth of the sensor network. Many works aim to detect a false event in-network even if many nodes are compromised. Certain existing methods can achieve this, but, they cannot be used in a situation where the location of the sink changes. We propose a new method that resiliently detects false messages, even when there are a large number of compromised nodes and that can handle situations where the location of the sink changes. By preloading a legitimate combination of keys (LCK) on sensor nodes before deployment, the nodes can detect false events created from false combinations of keys. Our mathematical analysis and the simulations we conducted prove the effectiveness of our method.
在大规模传感器网络中,攻击者可能会捕获并破坏多个传感器。被破坏的节点可以被攻击者利用来产生许多虚假信息,从而浪费传感器节点的电池和传感器网络的带宽。许多工作旨在检测网络中的虚假事件,即使许多节点受到损害。某些现有的方法可以实现这一点,但是,它们不能用于接收器位置发生变化的情况。我们提出了一种新方法,即使存在大量受损节点,也可以灵活地检测虚假消息,并且可以处理接收器位置发生变化的情况。通过在部署前在传感器节点上预加载合法的密钥组合(LCK),节点可以检测由错误的密钥组合创建的错误事件。数学分析和仿真结果证明了该方法的有效性。
{"title":"False Event Detection for Mobile Sinks in Wireless Sensor Networks","authors":"Y. Sei, Akihiko Ohsuga","doi":"10.1109/EISIC.2013.15","DOIUrl":"https://doi.org/10.1109/EISIC.2013.15","url":null,"abstract":"In large-scale sensor networks, adversaries may capture and compromise several of the sensors. Compromised nodes can be used by adversaries to generate many false messages which waste the batteries of sensor nodes and the bandwidth of the sensor network. Many works aim to detect a false event in-network even if many nodes are compromised. Certain existing methods can achieve this, but, they cannot be used in a situation where the location of the sink changes. We propose a new method that resiliently detects false messages, even when there are a large number of compromised nodes and that can handle situations where the location of the sink changes. By preloading a legitimate combination of keys (LCK) on sensor nodes before deployment, the nodes can detect false events created from false combinations of keys. Our mathematical analysis and the simulations we conducted prove the effectiveness of our method.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127541157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing the Border, Smartly 聪明地管理边境
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.72
Sandrine Trochu, O. Touret
Whatever the future holds in terms of new regulations and processes, the trend will be to record and secure border crossings for an increasing share of eligible passengers. In order for this trend to be derived into effective and efficient execution as well as for passengers to experience a fluent journey despite this increase of security requirements, performing an identification of passengers through a unique identifier, providing facilitated and automated checks and being capable to identify and then trace persons of interest will be needed and very valuable tracks to follow in order to achieve these objectives. The extent and pace to which these tracks will be followed and soundly articulated together will define how smartly the borders will be managed in the future.
无论在新的法规和程序方面的未来如何,趋势将是为越来越多的符合条件的乘客记录和确保过境。为了使这一趋势得到有效和高效的执行,并使乘客在安全要求增加的情况下体验流畅的旅程,通过唯一标识符对乘客进行识别,提供便利和自动的检查,并能够识别和跟踪感兴趣的人,将需要非常有价值的跟踪,以实现这些目标。这些轨道将被遵循的程度和速度,以及它们紧密结合在一起的程度和速度,将决定未来如何巧妙地管理边界。
{"title":"Managing the Border, Smartly","authors":"Sandrine Trochu, O. Touret","doi":"10.1109/EISIC.2013.72","DOIUrl":"https://doi.org/10.1109/EISIC.2013.72","url":null,"abstract":"Whatever the future holds in terms of new regulations and processes, the trend will be to record and secure border crossings for an increasing share of eligible passengers. In order for this trend to be derived into effective and efficient execution as well as for passengers to experience a fluent journey despite this increase of security requirements, performing an identification of passengers through a unique identifier, providing facilitated and automated checks and being capable to identify and then trace persons of interest will be needed and very valuable tracks to follow in order to achieve these objectives. The extent and pace to which these tracks will be followed and soundly articulated together will define how smartly the borders will be managed in the future.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Issues for the Next Generation of Criminal Network Investigation Tools 下一代犯罪网络侦查工具的问题
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.9
U. Wiil
Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.
犯罪网络调查涉及许多复杂的知识管理任务,人和软件工具在执行这些任务中起着核心作用。本文提出了未来网络犯罪侦查工具的发展方向。研究议程的灵感部分来自超文本领域关于如何构建工具来构建、可视化和管理知识的先前研究,部分来自情报和安全信息学领域关于犯罪网络调查工具支持的先前研究。以Crime Fighter为例,探讨当前犯罪网络调查工具的局限性,并提出未来工具需要解决的问题。
{"title":"Issues for the Next Generation of Criminal Network Investigation Tools","authors":"U. Wiil","doi":"10.1109/EISIC.2013.9","DOIUrl":"https://doi.org/10.1109/EISIC.2013.9","url":null,"abstract":"Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit 从Android操作系统设备的取证数据恢复:一个开源工具包
Pub Date : 2013-08-12 DOI: 10.1109/EISIC.2013.58
Patrick Dibb, Mohammad Hammoudeh
The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases. Data can include not just call history or text messages but, as mobile phones become more smart, it can also include internet web pages, chat data, social media files and other application data. In this paper we present an open-source toolkit has been developed to improve workflow for forensic analysts and to aid Android OS mobile phone forensics. This toolkit has been designed to automatically extract and handle all data extracted from the devices so that vital intelligence can be searched and identified quickly, accurately and efficiently. This paper describes and presents the features of this toolkit.
从移动电话中恢复数据是一个非常专业和不断发展的领域,可以为刑事案件的检控提供相当大的协助。数据不仅包括通话记录或短信,随着手机变得越来越智能,它还可以包括互联网网页、聊天数据、社交媒体文件和其他应用程序数据。在本文中,我们提出了一个开源工具包,以改善法医分析的工作流程,并帮助Android操作系统手机取证。该工具包旨在自动提取和处理从设备中提取的所有数据,以便快速,准确和有效地搜索和识别重要情报。本文描述并展示了该工具包的特性。
{"title":"Forensic Data Recovery from Android OS Devices: An Open Source Toolkit","authors":"Patrick Dibb, Mohammad Hammoudeh","doi":"10.1109/EISIC.2013.58","DOIUrl":"https://doi.org/10.1109/EISIC.2013.58","url":null,"abstract":"The recovery of data from mobile phones is a very specialist and evolving field, which can make considerable assistance in the prosecution of criminal cases. Data can include not just call history or text messages but, as mobile phones become more smart, it can also include internet web pages, chat data, social media files and other application data. In this paper we present an open-source toolkit has been developed to improve workflow for forensic analysts and to aid Android OS mobile phone forensics. This toolkit has been designed to automatically extract and handle all data extracted from the devices so that vital intelligence can be searched and identified quickly, accurately and efficiently. This paper describes and presents the features of this toolkit.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131856450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2013 European Intelligence and Security Informatics Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1