A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes

Author(s):  
Adarsh S. V. Nair ◽  
Beegom A. S. Ajeena
Author(s):  
LE Thanh Tam ◽  
Nguyen Minh Chau ◽  
Pham Ngoc Mai ◽  
Ngo Ha Phuong ◽  
Vu Khanh Huyen Tran

The technological revolution 4.0 brings great opportunities, but also cybercrimes to economic sectors, especially to banks. Using secondary data and survey results of 305 bank clients, the main findings of this paper are: (i) there are several types of cybercrimes in the banking sector; (ii) Vietnam is one of the top countries worldwide having hackers and being attacked by hackers, especially the banking sector. Three most common attacks are skimming, hacking and phishing. Number of cybercrime attacks in Vietnam are increasing rapidly over years; (iii) Vietnamese customers are very vulnerable to cybercrime in banking, as more than 58% seem to hear about cybercrimes, and how banks provide services to let them know about their transactions. However, more than 50% do not have any deep knowledge or any measures for preventing cybercrime; (iii) Customers believe in banks, but do not think that banks can deal with cybercrime issues well. They still feel traditional transactions are more secure than e-transactions; (iv) the reasons for high cybercrimes come from commercial banks (low management and human capacity), supporting environment (inadequate), legal framework (not yet strong and strict enough on cybercrimes), and clients (low level of financial literacy). Therefore, several solutions should be carried out, from all stakeholders, for improving the cybersecurity in Vietnamese banks. 


2019 ◽  
Vol 8 (3) ◽  
pp. 5926-5929

Blind forensic-investigation in a digital image is a new research direction in image security. It aims to discover the altered image content without any embedded security scheme. Block and key point based methods are the two dispensation options in blind image forensic investigation. Both the techniques exhibit the best performance to reveal the tampered image. The success of these methods is limited due to computational complexity and detection accuracy against various image distortions and geometric transformation operations. This article introduces different blind image tampering methods and introduces a robust image forensic investigation method to determine the copy-move tampered image by means of fuzzy logic approach. Empirical outcomes facilitate that the projected scheme effectively classifies copy-move type of forensic images as well as blurred tampered image. Overall detection accuracy of this method is high over the existing methods.


Water ◽  
2021 ◽  
Vol 13 (13) ◽  
pp. 1787
Author(s):  
Leena J. Shevade ◽  
Franco A. Montalto

Green infrastructure (GI) is viewed as a sustainable approach to stormwater management that is being rapidly implemented, outpacing the ability of researchers to compare the effectiveness of alternate design configurations. This paper investigated inflow data collected at four GI inlets. The performance of these four GI inlets, all of which were engineered with the same inlet lengths and shapes, was evaluated through field monitoring. A forensic interpretation of the observed inlet performance was conducted using conclusions regarding the role of inlet clogging and inflow rate as described in the previously published work. The mean inlet efficiency (meanPE), which represents the percentage of tributary area runoff that enters the inlet was 65% for the Nashville inlet, while at Happyland the NW inlet averaged 30%, the SW inlet 25%, and the SE inlet 10%, considering all recorded events during the monitoring periods. The analysis suggests that inlet clogging was the main reason for lower inlet efficiency at the SW and NW inlets, while for the SE inlet, performance was compromised by a reverse cross slope of the street. Spatial variability of rainfall, measurement uncertainty, uncertain tributary catchment area, and inlet depression characteristics are also correlated with inlet PE. The research suggests that placement of monitoring sensors should consider low flow conditions and a strategy to measure them. Additional research on the role of various maintenance protocols in inlet hydraulics is recommended.


Sign in / Sign up

Export Citation Format

Share Document