The IP address and time in cyber‐crime investigation

Author(s):  
Da‐Yu Kao ◽  
Shiuh‐Jeng Wang
Author(s):  
Mohammed S. Gadelrab ◽  
Ali A. Ghorbani

New computing and networking technologies have not only changed the way traditional crimes are committed but also introduced completely brand new “cyber” crimes. Cyber crime investigation and forensics is relatively a new field that can benefit from methods and tools from its predecessor, the traditional counterpart. This chapter explains the problem of cyber criminal profiling and why it differs from ordinary criminal profiling. It tries to provide an overview of the problem and the current approaches combined with a suggested solution. It also discusses some serious challenges that should be addressed to be able to produce reliable results and it finally presents some ideas for the future work.


Author(s):  
Boutheina Fessi ◽  
Yacine Djemaiel ◽  
Noureddine Boudriga

This chapter provides a review about the usefulness of applying data mining techniques to detect intrusion within dynamic environments and its contribution in digital investigation. Numerous applications and models are described based on data mining analytics. The chapter addresses also different requirements that should be fulfilled to efficiently perform cyber-crime investigation based on data mining analytics. It states, at the end, future research directions related to cyber-crime investigation that could be investigated and presents new trends of data mining techniques that deal with big data to detect attacks.


2017 ◽  
Vol 9 (4) ◽  
pp. 40-47
Author(s):  
Zhi Jun Liu

In the early stages of the digital investigation of cyber crime, digital evidence is inadequate, decentralized and fragmented. Cyber crime investigation model based on case characteristics is presented in this paper, to help determine investigation orientation and reduce investigation area. Firstly, purifying and filtering the digital evidence collected, classification and acquirement of event sets are accomplished. Secondly, a method of imperfect induction is applied to analyze the event sets and construct one or more premises, and combining with the case characteristics extracted from the legal requirements, inference and its reliability are given. Finally, through a case analysis of network pyramid sales, the initial practice shows the model is feasible and has a consulting value with cyber crime investigation.


Author(s):  
Boutheina A. Fessi ◽  
Yacine Djemaiel ◽  
Noureddine Boudriga

This chapter provides a review about the usefulness of applying data mining techniques to detect intrusion within dynamic environments and its contribution in digital investigation. Numerous applications and models are described based on data mining analytics. The chapter addresses also different requirements that should be fulfilled to efficiently perform cyber-crime investigation based on data mining analytics. It states, at the end, future research directions related to cyber-crime investigation that could be investigated and presents new trends of data mining techniques that deal with big data to detect attacks.


Author(s):  
Rusydi Umar ◽  
Imam Riadi ◽  
Bashor Fauzan Muthohirin

Email is one of the results of the development of information and communication technology. Email is widely used to exchange information by sending and receiving data, such as document files, images, correspondence and others. With the development of technology and information causing crimes in communicating also growing, the perpetrators of cyber crime commonly referred to as cybercrime. Any crime committed by cybercrime will surely leave the evidence, in this study will make the acquisition of android-based email using the method of national institute of standards and technology (NIST). The results obtained IP address of the sender's email header as digital evidence.


Sign in / Sign up

Export Citation Format

Share Document