首页 > 最新文献

2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)最新文献

英文 中文
Vulnerability to social engineering in social networks: a proposed user-centric framework 社会网络中社会工程的脆弱性:一个以用户为中心的框架
Pub Date : 2016-11-17 DOI: 10.1109/ICCCF.2016.7740435
S. Albladi, G. Weir
Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of potential victims. The number of social engineering attacks has risen dramatically in the past few years, causing unpleasant damage both to organizations and individuals. Yet little research has discussed social engineering in the virtual environments of social networks. One approach to counter these exploits is through research that aims to understand why people fall victim to such attacks. Previous social engineering and deception research have not satisfactory identified the factors that influence the users' ability to detect attacks. Characteristics that influence users' vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and education for those users. In this context, the present study proposes a user-centric framework to understand the user's susceptibility, relevant factors and dimensions.
社交网站拥有数十亿用户,他们每天都在交流和分享他们的个人信息。社会工程被认为是当今信息安全的最大威胁之一。社会工程是一种攻击者操纵和欺骗用户以访问或获取特权信息的技术。这种攻击不断发展,以欺骗大量潜在的受害者。在过去几年中,社会工程攻击的数量急剧增加,给组织和个人造成了令人不快的损害。然而,很少有研究讨论社交网络虚拟环境中的社会工程。对付这些攻击的一种方法是通过研究,旨在了解为什么人们会成为此类攻击的受害者。以往的社会工程和欺骗研究并没有令人满意地确定影响用户检测攻击能力的因素。必须调查影响用户脆弱性的特征,以解决这一问题,并帮助建立易受伤害用户的档案,以便集中精力增加对这些用户的培训计划和教育。在此背景下,本研究提出了一个以用户为中心的框架来理解用户的易感性、相关因素和维度。
{"title":"Vulnerability to social engineering in social networks: a proposed user-centric framework","authors":"S. Albladi, G. Weir","doi":"10.1109/ICCCF.2016.7740435","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740435","url":null,"abstract":"Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of potential victims. The number of social engineering attacks has risen dramatically in the past few years, causing unpleasant damage both to organizations and individuals. Yet little research has discussed social engineering in the virtual environments of social networks. One approach to counter these exploits is through research that aims to understand why people fall victim to such attacks. Previous social engineering and deception research have not satisfactory identified the factors that influence the users' ability to detect attacks. Characteristics that influence users' vulnerability must be investigated to address this issue and help to build a profile for vulnerable users in order to focus on increasing the training programs and education for those users. In this context, the present study proposes a user-centric framework to understand the user's susceptibility, relevant factors and dimensions.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Positing the problem: enhancing classification of extremist web content through textual analysis 定位问题:通过文本分析加强极端主义网络内容的分类
Pub Date : 2016-11-17 DOI: 10.1109/ICCCF.2016.7740431
G. Weir, Emanuel Dos Santos, B. Cartwright, Richard Frank
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization of disaffected young adults who may then engage in terrorist activities at home or fight alongside terrorist groups abroad. This paper reports on advances in techniques for classifying data collected by the Terrorism and Extremism Network Extractor (TENE) webcrawler, a custom-written program that browses the World Wide Web, collecting vast amounts of data, retrieving the pages it visits, analyzing them, and recursively following the links out of those pages. The textual content is subjected to enhanced classification through software analysis, using the Posit textual analysis toolset, generating a detailed frequency analysis of the syntax, including multi-word units and associated part-of-speech components. Results are then deployed in a knowledge extraction process using knowledge extraction algorithms, e.g., from the WEKA system. Indications are that the use of the data enrichment through application of Posit analysis affords a greater degree of match between automatic and manual classification than previously attained. Furthermore, the incorporation and deployment of these technologies promises to provide public safety officials with techniques that can help to detect terrorist webpages, gauge the intensity of their content, discriminate between webpages that do or do not require a concerted response, and take appropriate action where warranted.
含有恐怖主义和极端主义内容的网页是招募心怀不满的年轻人并使其激进化的关键因素,这些年轻人随后可能在国内从事恐怖主义活动,或在国外与恐怖组织并肩作战。本文报告了恐怖主义和极端主义网络提取器(TENE)网络爬虫收集的数据分类技术的进展,TENE是一个自定义编写的程序,它浏览万维网,收集大量数据,检索它访问的页面,分析它们,并递归地跟踪这些页面的链接。文本内容通过软件分析进行增强分类,使用Posit文本分析工具集,生成语法的详细频率分析,包括多词单位和相关的词性成分。然后使用知识提取算法(例如来自WEKA系统)将结果部署到知识提取过程中。有迹象表明,通过应用Posit分析来丰富数据,使自动分类和人工分类之间的匹配程度比以前更高。此外,这些技术的整合和部署承诺为公共安全官员提供技术,可以帮助检测恐怖主义网页,衡量其内容的强度,区分需要或不需要协调响应的网页,并在必要时采取适当的行动。
{"title":"Positing the problem: enhancing classification of extremist web content through textual analysis","authors":"G. Weir, Emanuel Dos Santos, B. Cartwright, Richard Frank","doi":"10.1109/ICCCF.2016.7740431","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740431","url":null,"abstract":"Webpages with terrorist and extremist content are key factors in the recruitment and radicalization of disaffected young adults who may then engage in terrorist activities at home or fight alongside terrorist groups abroad. This paper reports on advances in techniques for classifying data collected by the Terrorism and Extremism Network Extractor (TENE) webcrawler, a custom-written program that browses the World Wide Web, collecting vast amounts of data, retrieving the pages it visits, analyzing them, and recursively following the links out of those pages. The textual content is subjected to enhanced classification through software analysis, using the Posit textual analysis toolset, generating a detailed frequency analysis of the syntax, including multi-word units and associated part-of-speech components. Results are then deployed in a knowledge extraction process using knowledge extraction algorithms, e.g., from the WEKA system. Indications are that the use of the data enrichment through application of Posit analysis affords a greater degree of match between automatic and manual classification than previously attained. Furthermore, the incorporation and deployment of these technologies promises to provide public safety officials with techniques that can help to detect terrorist webpages, gauge the intensity of their content, discriminate between webpages that do or do not require a concerted response, and take appropriate action where warranted.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132989203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Big data and digital forensics 大数据和数字取证
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740422
O. M. Adedayo
One of the main challenges in digital forensics is the increasing volume of data that needs to be analyzed. This problem has become even more pronounced with the emergence of big data and calls for a rethink on the way digital forensics investigations have been handled over the past years. This paper briefly discusses the challenges and needs of digital forensics in the face of the current trends and requirements of different investigations. A digital forensics analysis framework that puts into consideration the existing techniques as well as the current challenges is proposed. The purpose of the framework is to reassess the various stages of the digital forensics examination process and introduce into each stage the required techniques to enhance better collection, analysis, preservation and presentation in the face of big data and other challenges facing digital forensics.
数字取证的主要挑战之一是需要分析的数据量不断增加。随着大数据的出现,这个问题变得更加明显,人们呼吁重新思考过去几年处理数字取证调查的方式。本文简要讨论了数字取证在面对当前趋势和不同调查要求时所面临的挑战和需要。提出了一种综合考虑现有技术和当前挑战的数字取证分析框架。该框架的目的是重新评估数字取证审查过程的各个阶段,并在每个阶段引入所需的技术,以便在面对大数据和数字取证面临的其他挑战时更好地收集、分析、保存和呈现。
{"title":"Big data and digital forensics","authors":"O. M. Adedayo","doi":"10.1109/ICCCF.2016.7740422","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740422","url":null,"abstract":"One of the main challenges in digital forensics is the increasing volume of data that needs to be analyzed. This problem has become even more pronounced with the emergence of big data and calls for a rethink on the way digital forensics investigations have been handled over the past years. This paper briefly discusses the challenges and needs of digital forensics in the face of the current trends and requirements of different investigations. A digital forensics analysis framework that puts into consideration the existing techniques as well as the current challenges is proposed. The purpose of the framework is to reassess the various stages of the digital forensics examination process and introduce into each stage the required techniques to enhance better collection, analysis, preservation and presentation in the face of big data and other challenges facing digital forensics.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Game private networks performance: analytical models for very-large scale simulation 游戏专用网络性能:超大规模模拟的分析模型
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740433
Gaétan Hains, Y. Khmelevsky, R. Bartlett, A. Needham
The WTFast's Gamers Private Network (GPN®) is a client/server solution that makes online games faster. GPN® connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPN® success and runs against the vast complexity of internet-wide systems. We have built an experimental network of virtualized GPN® components so as to carefully measure the statistics of latency for distributed Minecraft games and to do so in a controlled laboratory environment. This has led to a better understanding of the coupling between parameters such as: the number of players, the subset of players that are idle or active, the volume of packets exchanged, the size of packets, latency to and from the game servers, and time-series for most of those parameters. In this paper we present a mathematical model of those system game network parameters and show how it leads to: (1) realistic simulation of each of those network or game parameters, without relying on the experimental setup; (2) very large-scale numerical simulation of the game setup so as to explore various internet-wide performance scenarios that: (a) are impossible to isolate from internet “noise” in their real environment and; (b) would require vast supercomputing resources if they were to be simulated exhaustively. We motivate all elements of our mathematical model and estimate the savings in computational costs they will bring for very large-scale simulation of the GPN®. Such simulations will improve quality of service for GPN® systems and their reliability.
WTFast的玩家专用网络(GPN®)是一个客户端/服务器解决方案,使在线游戏更快。GPN®通过广域网将在线视频游戏玩家与通用游戏服务连接起来。网络游戏是由个人玩家在虚拟环境中进行的互动竞赛。响应时间、延迟及其可预测性是GPN®成功的关键,并与互联网范围内系统的巨大复杂性相对抗。我们建立了一个虚拟GPN®组件的实验网络,以便在受控的实验室环境中仔细测量分布式Minecraft游戏的延迟统计数据。这有助于我们更好地理解参数之间的耦合,例如:玩家数量、空闲或活动的玩家子集、交换的数据包数量、数据包大小、往返游戏服务器的延迟以及大多数这些参数的时间序列。在本文中,我们提出了这些系统博弈网络参数的数学模型,并展示了它如何导致:(1)不依赖于实验设置,对每个网络或博弈参数进行逼真的模拟;(2)非常大规模的数值模拟游戏设置,以探索各种互联网范围内的性能场景,(a)在其真实环境中无法与互联网“噪音”隔离;(b)若要详尽地模拟,将需要庞大的超级计算资源。我们激励数学模型的所有元素,并估计它们将为GPN®的大规模模拟带来的计算成本节省。这样的模拟将提高GPN®系统的服务质量和可靠性。
{"title":"Game private networks performance: analytical models for very-large scale simulation","authors":"Gaétan Hains, Y. Khmelevsky, R. Bartlett, A. Needham","doi":"10.1109/ICCCF.2016.7740433","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740433","url":null,"abstract":"The WTFast's Gamers Private Network (GPN®) is a client/server solution that makes online games faster. GPN® connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPN® success and runs against the vast complexity of internet-wide systems. We have built an experimental network of virtualized GPN® components so as to carefully measure the statistics of latency for distributed Minecraft games and to do so in a controlled laboratory environment. This has led to a better understanding of the coupling between parameters such as: the number of players, the subset of players that are idle or active, the volume of packets exchanged, the size of packets, latency to and from the game servers, and time-series for most of those parameters. In this paper we present a mathematical model of those system game network parameters and show how it leads to: (1) realistic simulation of each of those network or game parameters, without relying on the experimental setup; (2) very large-scale numerical simulation of the game setup so as to explore various internet-wide performance scenarios that: (a) are impossible to isolate from internet “noise” in their real environment and; (b) would require vast supercomputing resources if they were to be simulated exhaustively. We motivate all elements of our mathematical model and estimate the savings in computational costs they will bring for very large-scale simulation of the GPN®. Such simulations will improve quality of service for GPN® systems and their reliability.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129495108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security countermeasures in the cyber-world 网络世界的安全对策
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740440
Andreea Bendovschi, Ameer Al-Nemrat
Companies and individuals are becoming more dependant on technology, automated processes, the Internet of Things (IoT) and daily use of internet, mobile devices, and other tools that the technological revolution has created. But against the back-drop of rapid technological progress, cyber-threats have become a serious challenge that require immediate, continuous action. As cyber-crime poses an ever-present and growing threat, corporate and individual users of the cyber-space are constantly struggling to ensure an acceptable level of security with respect to their assets. Based on an analysis of 4,785 attacks deployed world-wide in recent years, this paper outlines the correlations and patterns identified, with the final objective of defining security countermeasures that organisations from certain business sectors could implement in order to focus their limited resources and budget on mitigating the right risks.
公司和个人越来越依赖于技术、自动化流程、物联网(IoT)以及日常使用的互联网、移动设备和技术革命创造的其他工具。但在技术快速进步的背景下,网络威胁已经成为一个严重的挑战,需要立即采取持续的行动。由于网络犯罪构成了一个无处不在且日益增长的威胁,网络空间的企业和个人用户一直在努力确保其资产的安全水平达到可接受的水平。基于对近年来全球部署的4,785次攻击的分析,本文概述了确定的相关性和模式,最终目标是定义来自某些业务部门的组织可以实施的安全对策,以便将有限的资源和预算集中在减轻正确的风险上。
{"title":"Security countermeasures in the cyber-world","authors":"Andreea Bendovschi, Ameer Al-Nemrat","doi":"10.1109/ICCCF.2016.7740440","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740440","url":null,"abstract":"Companies and individuals are becoming more dependant on technology, automated processes, the Internet of Things (IoT) and daily use of internet, mobile devices, and other tools that the technological revolution has created. But against the back-drop of rapid technological progress, cyber-threats have become a serious challenge that require immediate, continuous action. As cyber-crime poses an ever-present and growing threat, corporate and individual users of the cyber-space are constantly struggling to ensure an acceptable level of security with respect to their assets. Based on an analysis of 4,785 attacks deployed world-wide in recent years, this paper outlines the correlations and patterns identified, with the final objective of defining security countermeasures that organisations from certain business sectors could implement in order to focus their limited resources and budget on mitigating the right risks.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123818033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercriminals, cyberattacks and cybercrime 网络罪犯、网络攻击和网络犯罪
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740434
Regner Sabillon, Victor Cavaller, Jeimy Cano, Jordi Serra-Ruiz
Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.
如今,随着新技术、新应用和新网络的出现,网络犯罪在全球范围内迅速增长。此外,深网还助长了网络空间非法活动的增长。因此,网络犯罪分子正在利用系统漏洞为自己谋利。本文介绍了网络犯罪的历史和概念,探讨了网络罪犯和网络攻击的不同分类,并阐述了我们详尽的网络攻击类型或分类法。常见的分类包括计算机是犯罪的目标,计算机被用作实施重罪的工具,或者数字设备是执行犯罪的附带条件。我们通过分析经验教训和未来可以采取的行动来结束我们的研究,以解决网络犯罪和加强各级网络安全。
{"title":"Cybercriminals, cyberattacks and cybercrime","authors":"Regner Sabillon, Victor Cavaller, Jeimy Cano, Jordi Serra-Ruiz","doi":"10.1109/ICCCF.2016.7740434","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740434","url":null,"abstract":"Nowadays, cybercrime is growing rapidly around the world, as new technologies, applications and networks emerge. In addition, the Deep Web has contributed to the growth of illegal activities in cyberspace. As a result, cybercriminals are taking advantage of system vulnerabilities for their own benefit. This article presents the history and conceptualization of cybercrime, explores different categorizations of cybercriminals and cyberattacks, and sets forth our exhaustive cyberattack typology, or taxonomy. Common categories include where the computer is the target to commit the crime, where the computer is used as a tool to perpetrate the felony, or where a digital device is an incidental condition to the execution of a crime. We conclude our study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Linguistic analysis of lone offender manifestos 孤犯宣言的语言分析
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740427
Lisa Kaati, A. Shrestha, Katie Cohen
The Internet and social media allow people to spread their views rapidly to a large group of people. While the right to freely express one's ideas and views is a cornerstone in a democratic society, in some cases the Internet can serve as a breeding ground for violent extremism and terrorism. Hence, in order to protect democracy, effective techniques of Internet surveillance are needed. Previous research has shown that there is a connection between word use and psychological states. The text analysis tool Linguistic Inquiry and Word Count (LIWC) counts words in psychologically meaningful categories. Based on the relative frequency of words from the different categories, conclusions can be drawn about the author of for instance a blog text. In this work, we have explored the characteristics of written communication produced by ten different lone offenders prior to their engagement in targeted violence. We found eight possible indicators of the drives and emotions that preceded their attacks.
互联网和社交媒体使人们能够迅速将自己的观点传播给一大群人。虽然自由表达思想和观点的权利是民主社会的基石,但在某些情况下,互联网可能成为滋生暴力极端主义和恐怖主义的温床。因此,为了保护民主,需要有效的网络监控技术。先前的研究表明,词汇的使用和心理状态之间存在联系。文本分析工具语言查询和单词计数(LIWC)统计心理意义类别中的单词。根据不同类别中单词的相对频率,可以得出关于作者的结论,例如博客文本。在这项工作中,我们探索了十个不同的孤独罪犯在参与有针对性的暴力之前所产生的书面交流的特征。我们发现了八种可能的迹象表明他们袭击前的动机和情绪。
{"title":"Linguistic analysis of lone offender manifestos","authors":"Lisa Kaati, A. Shrestha, Katie Cohen","doi":"10.1109/ICCCF.2016.7740427","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740427","url":null,"abstract":"The Internet and social media allow people to spread their views rapidly to a large group of people. While the right to freely express one's ideas and views is a cornerstone in a democratic society, in some cases the Internet can serve as a breeding ground for violent extremism and terrorism. Hence, in order to protect democracy, effective techniques of Internet surveillance are needed. Previous research has shown that there is a connection between word use and psychological states. The text analysis tool Linguistic Inquiry and Word Count (LIWC) counts words in psychologically meaningful categories. Based on the relative frequency of words from the different categories, conclusions can be drawn about the author of for instance a blog text. In this work, we have explored the characteristics of written communication produced by ten different lone offenders prior to their engagement in targeted violence. We found eight possible indicators of the drives and emotions that preceded their attacks.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121488519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Data-driven system identification of the social network dynamics in online postings of an extremist group 数据驱动系统识别极端组织在线帖子中的社会网络动态
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740429
A. Diaz, Jongeun Choi, T. Holt, S. Chermak, Joshua D. Freilich
Terrorism research has begun to focus on the issue of radicalization, or the acceptance of ideological belief systems that lead toward violence. There has been particular attention paid to the role of the Internet in the exposure to and promotion of radical ideas. There is, however, minimal work that attempts to model the ways that messages are spread or how individual participation in radical on-line communities operates. In this paper, we present a stochastic linear system to represent the evolution of contribution to a sample of 126 threads in an on-line forum where individuals discuss radical belief systems. To estimate or predict the time-varying contributions of agents for given online-forum data, each agent's contribution has been modeled as a state variable. We then use the expectation-maximization (EM) algorithm to identify the model parameters including the adjacency matrix of the graph constructed among participating agents along with measurement and system uncertainty levels in online-postings. Our approach reveals the identified dynamical influences among agents in the time-varying shaping of the contribution in a datadriven fashion. We use the real-world data from online-postings to demonstrate the usefulness of our approach, and its application toward on-line radicalization.
恐怖主义研究已经开始关注激进化问题,或者接受导致暴力的意识形态信仰体系。人们特别关注互联网在暴露和宣传激进思想方面的作用。然而,对信息传播方式或激进的在线社区中的个人参与如何运作进行建模的工作很少。在本文中,我们提出了一个随机线性系统来表示对126个在线论坛中个人讨论激进信仰系统的贡献的演变。对于给定的在线论坛数据,为了估计或预测代理的时变贡献,每个代理的贡献都被建模为状态变量。然后,我们使用期望最大化(EM)算法来识别模型参数,包括参与代理之间构建的图的邻接矩阵以及在线帖子的测量和系统不确定性水平。我们的方法以数据驱动的方式揭示了在贡献的时变塑造中确定的代理之间的动态影响。我们使用来自在线帖子的真实世界数据来证明我们的方法的有效性,以及它在在线激进化方面的应用。
{"title":"Data-driven system identification of the social network dynamics in online postings of an extremist group","authors":"A. Diaz, Jongeun Choi, T. Holt, S. Chermak, Joshua D. Freilich","doi":"10.1109/ICCCF.2016.7740429","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740429","url":null,"abstract":"Terrorism research has begun to focus on the issue of radicalization, or the acceptance of ideological belief systems that lead toward violence. There has been particular attention paid to the role of the Internet in the exposure to and promotion of radical ideas. There is, however, minimal work that attempts to model the ways that messages are spread or how individual participation in radical on-line communities operates. In this paper, we present a stochastic linear system to represent the evolution of contribution to a sample of 126 threads in an on-line forum where individuals discuss radical belief systems. To estimate or predict the time-varying contributions of agents for given online-forum data, each agent's contribution has been modeled as a state variable. We then use the expectation-maximization (EM) algorithm to identify the model parameters including the adjacency matrix of the graph constructed among participating agents along with measurement and system uncertainty levels in online-postings. Our approach reveals the identified dynamical influences among agents in the time-varying shaping of the contribution in a datadriven fashion. We use the real-world data from online-postings to demonstrate the usefulness of our approach, and its application toward on-line radicalization.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electromagnetic analysis attack for a lightweight cipher PRINCE 轻量级密码PRINCE的电磁分析攻击
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740423
M. Yoshikawa, Y. Nozaki
Ensuring the security of built-in apparatuses has become an important task because of advancements in Internet of Things (IoT) technology. Therefore, lightweight ciphers that are available in built-in apparatuses have attracted the attention of many researchers. However, the danger of electromagnetic analysis attacks against cryptographic circuits has been pointed out. Electromagnetic analysis attacks illegally analyze confidential information using the electromagnetic waves that are generated during the operation of a cryptographic circuit. Many studies have reported on power analysis attacks against the advanced encryption standard (AES). However, as far as we know, no study has reported on electromagnetic analysis attacks against PRINCE, which is one of the most popular lightweight ciphers. The present study proposes a method for electromagnetic analysis attacks against PRINCE in order to evaluate the tamper resistance of PRINCE. The present study also verifies the validity of the proposed method by performing an evaluation experiment using a field-programmable gate array (FPGA).
由于物联网(IoT)技术的进步,确保内置设备的安全性已成为一项重要任务。因此,可在内置设备中使用的轻量级密码引起了许多研究者的关注。然而,已经指出了电磁分析攻击对密码电路的危害。电磁分析攻击是利用加密电路运行过程中产生的电磁波,对机密信息进行非法分析。许多研究报告了针对高级加密标准(AES)的功率分析攻击。然而,据我们所知,目前还没有针对PRINCE的电磁分析攻击的研究报告,PRINCE是最流行的轻量级密码之一。本文提出了一种针对PRINCE的电磁分析攻击方法,以评估PRINCE的抗篡改能力。本研究还通过使用现场可编程门阵列(FPGA)进行评估实验来验证所提出方法的有效性。
{"title":"Electromagnetic analysis attack for a lightweight cipher PRINCE","authors":"M. Yoshikawa, Y. Nozaki","doi":"10.1109/ICCCF.2016.7740423","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740423","url":null,"abstract":"Ensuring the security of built-in apparatuses has become an important task because of advancements in Internet of Things (IoT) technology. Therefore, lightweight ciphers that are available in built-in apparatuses have attracted the attention of many researchers. However, the danger of electromagnetic analysis attacks against cryptographic circuits has been pointed out. Electromagnetic analysis attacks illegally analyze confidential information using the electromagnetic waves that are generated during the operation of a cryptographic circuit. Many studies have reported on power analysis attacks against the advanced encryption standard (AES). However, as far as we know, no study has reported on electromagnetic analysis attacks against PRINCE, which is one of the most popular lightweight ciphers. The present study proposes a method for electromagnetic analysis attacks against PRINCE in order to evaluate the tamper resistance of PRINCE. The present study also verifies the validity of the proposed method by performing an evaluation experiment using a field-programmable gate array (FPGA).","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Causes of socioeconomic cybercrime in Nigeria 尼日利亚社会经济网络犯罪的原因
Pub Date : 2016-06-12 DOI: 10.1109/ICCCF.2016.7740439
S. Ibrahim
The causations of crimes that are relevant in the cyberspace concurrently impact in the physical space and vise versa. This paper aims to explore parents' perceptions of the factors that cause socioeconomic cybercrime in Nigeria. Despite a long-standing view that the juvenile offenders of today could become the hardened criminals of tomorrow, and the conclusions of a number of developmental theories on the stability of delinquency across the life course, the existing data on cybercrimes in Nigeria have principally been derived from studies involving university students. Yet, individuals' moralstandard- levels, which shape their offending capacities, are mostly developed in childhood. The empirical basis for this paper is face-to-face interviews with 17 Nigerian parents regarding children's vulnerability to involvement in cybercrime. Drawing upon qualitative data, this paper argues that a complex web of familial factors and structural forces, alongside cultural forces, explains the degree of cybercrime involvement on the part of Nigerian youths.
与网络空间相关的犯罪原因同时影响物理空间,反之亦然。本文旨在探讨尼日利亚父母对导致社会经济网络犯罪的因素的看法。尽管长期以来人们一直认为,今天的少年犯可能会成为明天的惯犯,也有许多关于犯罪在整个生命过程中稳定性的发展理论得出结论,但尼日利亚现有的网络犯罪数据主要来自对大学生的研究。然而,影响个人犯罪能力的道德标准水平大多是在童年时期形成的。本文的实证基础是对17位尼日利亚父母关于儿童易受网络犯罪影响的面对面访谈。根据定性数据,本文认为,家庭因素和结构力量的复杂网络,以及文化力量,解释了尼日利亚年轻人参与网络犯罪的程度。
{"title":"Causes of socioeconomic cybercrime in Nigeria","authors":"S. Ibrahim","doi":"10.1109/ICCCF.2016.7740439","DOIUrl":"https://doi.org/10.1109/ICCCF.2016.7740439","url":null,"abstract":"The causations of crimes that are relevant in the cyberspace concurrently impact in the physical space and vise versa. This paper aims to explore parents' perceptions of the factors that cause socioeconomic cybercrime in Nigeria. Despite a long-standing view that the juvenile offenders of today could become the hardened criminals of tomorrow, and the conclusions of a number of developmental theories on the stability of delinquency across the life course, the existing data on cybercrimes in Nigeria have principally been derived from studies involving university students. Yet, individuals' moralstandard- levels, which shape their offending capacities, are mostly developed in childhood. The empirical basis for this paper is face-to-face interviews with 17 Nigerian parents regarding children's vulnerability to involvement in cybercrime. Drawing upon qualitative data, this paper argues that a complex web of familial factors and structural forces, alongside cultural forces, explains the degree of cybercrime involvement on the part of Nigerian youths.","PeriodicalId":281072,"journal":{"name":"2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1