Browse By Repository:

 
 
 
   

A New Profiling Framework Using Criminology Theory For Tracing Cyber Violent Extremism (CVE) In Forensic Analysis

Selamat, Siti Rahayu and Sahib, Shahrin and Ahmad, Rabiah and Sa'aya, Zurina and Mas'ud, Mohd Zaki (2018) A New Profiling Framework Using Criminology Theory For Tracing Cyber Violent Extremism (CVE) In Forensic Analysis. Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img] Text (24 Pages)
A New Profiling Framework Using Criminology Theory For Tracing Cyber Violent Extremism (CVE) In Forensic Analysis.pdf - Submitted Version
Restricted to Registered users only

Download (379kB)

Abstract

Due to the rapid change in cyber-attacks technologies, the mechanisms for detecting attackers need to be improved. Moreover, the unregulated Internet communication enables cyber attackers to easily launch unlawful attacks against computer systems, computer program or data that can damage cyberspace infrastructure itself or some other target. This research focuses on development of a profile framework for tracing cyber-attacks, recently known as Cyber Violent Extremism (CVE). The proposed profile is important to detect potential person or group, which directly involved in the attack. To the best of our knowledge, current detection methods only detect cyber attackers without tracing and profiling the activities of the offender of CVE. Therefore, the proposed profile framework will be required as initial step for tracing and eventually improving detection accuracy of the extremist group. Note that, the characteristics of CVE activities are different from normal attackers. The proposed profile framework is designed using criminology theory for tracing CVE. Profiling is the technique that is used to generalize personal characteristics or behaviour of a person. By adopting criminology theory, it will help to identify threat characteristics of CVE and that can be used to develop profiling framework for tracing CVE activities. The proposed profiling framework will be embedded into forensic investigation and law enforcement like identification of potential CVE offender. To develop the framework, several phases of activities have been identified. The first phase involves extraction and classifying characteristics of CVE, then mapping these characteristics with defined parameters. Next phase is to verify and finally to develop the profiling framework of CVE. This research will utilize potential public data set, which available on the cyber space such as web blogs and forum sites.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Computer crimes, Cyberterrorism
Subjects: H Social Sciences > H Social Sciences (General)
H Social Sciences > HV Social pathology. Social and public welfare
Divisions: Library > Long/ Short Term Research > FTMK
Depositing User: Mohd Hannif Jamaludin
Date Deposited: 31 Dec 2019 02:58
Last Modified: 31 Dec 2019 02:58
URI: http://digitalcollection.utem.edu.my/id/eprint/24132

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year