{"title":"应用可视化和分析数据调查网络犯罪(案例:网页污损)","authors":"Mandahadi Kusuma, Dedy Hariyadi, Indah Daila Sari","doi":"10.4028/p-9jbcba","DOIUrl":null,"url":null,"abstract":"Even now, many website owners still find cyberattacks—typically web defacement—terrifying. The Indonesian police's Criminal Investigation Unit is still working to track down and apprehend web hackers and vandals because such activity violates the law, could negatively impact an institution's day-to-day operations, necessitates additional funding for repairs, and carries the risk of database theft. In order to map the social network of the cybercrime suspect, this study used VOSviewer as a tool and Zone-H.org as a data source. Both of these sources can be accessible by the general public and used as Open Source Intelligence (OSINT) data. We were able to map one of the suspects who was apprehended by law enforcement, who goes by the pseudonym xgxs and goes by the username 13chmod37. This allowed us to give a general picture of the parties who might have been participating in the web defacement activity. The information we gave may be used by law enforcement to conduct additional investigations and track down additional offenders who are responsible for cyber attacks, particularly site defacement activity.","PeriodicalId":512976,"journal":{"name":"Engineering Headway","volume":"11 19","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Applying Visualization and Analysis Data to Investigate Cyber Crimes (Case: Web Defacement)\",\"authors\":\"Mandahadi Kusuma, Dedy Hariyadi, Indah Daila Sari\",\"doi\":\"10.4028/p-9jbcba\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Even now, many website owners still find cyberattacks—typically web defacement—terrifying. The Indonesian police's Criminal Investigation Unit is still working to track down and apprehend web hackers and vandals because such activity violates the law, could negatively impact an institution's day-to-day operations, necessitates additional funding for repairs, and carries the risk of database theft. In order to map the social network of the cybercrime suspect, this study used VOSviewer as a tool and Zone-H.org as a data source. Both of these sources can be accessible by the general public and used as Open Source Intelligence (OSINT) data. We were able to map one of the suspects who was apprehended by law enforcement, who goes by the pseudonym xgxs and goes by the username 13chmod37. This allowed us to give a general picture of the parties who might have been participating in the web defacement activity. The information we gave may be used by law enforcement to conduct additional investigations and track down additional offenders who are responsible for cyber attacks, particularly site defacement activity.\",\"PeriodicalId\":512976,\"journal\":{\"name\":\"Engineering Headway\",\"volume\":\"11 19\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Engineering Headway\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4028/p-9jbcba\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering Headway","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4028/p-9jbcba","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applying Visualization and Analysis Data to Investigate Cyber Crimes (Case: Web Defacement)
Even now, many website owners still find cyberattacks—typically web defacement—terrifying. The Indonesian police's Criminal Investigation Unit is still working to track down and apprehend web hackers and vandals because such activity violates the law, could negatively impact an institution's day-to-day operations, necessitates additional funding for repairs, and carries the risk of database theft. In order to map the social network of the cybercrime suspect, this study used VOSviewer as a tool and Zone-H.org as a data source. Both of these sources can be accessible by the general public and used as Open Source Intelligence (OSINT) data. We were able to map one of the suspects who was apprehended by law enforcement, who goes by the pseudonym xgxs and goes by the username 13chmod37. This allowed us to give a general picture of the parties who might have been participating in the web defacement activity. The information we gave may be used by law enforcement to conduct additional investigations and track down additional offenders who are responsible for cyber attacks, particularly site defacement activity.