Advances in Digital Crime, Forensics, and Cyber Terrorism - Combating Security Breaches and Criminal Activity in the Digital Sphere
Latest Publications


TOTAL DOCUMENTS

16
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781522501930, 9781522501947

Author(s):  
P. Vetrivelan ◽  
M. Jagannath ◽  
T. S. Pradeep Kumar

The Internet has transformed greatly the improved way of business, this vast network and its associated technologies have opened the doors to an increasing number of security threats which are dangerous to networks. The first part of this chapter presents a new dimension of denial of service attacks called TCP SYN Flood attack has been witnessed for severity of damage and second part on worms which is the major threat to the internet. The TCP SYN Flood attack by means of anomaly detection and traces back the real source of the attack using Modified Efficient Packet Marking algorithm (EPM). The mechanism for detecting the smart natured camouflaging worms which is sensed by means of a technique called Modified Controlled Packet Transmission (MCPT) technique. Finally the network which is affected by these types of worms are detected and recovered by means of Modified Centralized Worm Detector (MCWD) mechanism. The Network Intrusion Detection and Prevention Systems (NIDPS) on Flooding and Worm Attacks were analyzed and presented.


Author(s):  
Hemalatha J. ◽  
Kavitha Devi M. K.

In this chapter, a new data conceal technique is anticipated for digital images. The method computes the interpolation error of the image by using histogram shifting method and difference expansion. With the expectation of embedding high payload and less distortion, the undisclosed data has embedded in the interpolating error. Additionally for hiding the data, reversible data hiding technique is used. The histogram deviation is used as evidence for resulting the data conceal in the stereo images. To our best knowledge, by extracting the statistical feature from the image subsample works as steganalysis scheme. To enhance the revealing rate precision the well known support vector machine acts as classifier. In addition to that the experimental results show that the proposed steganalysis method has enhanced the detection exactness of the stego images.


Author(s):  
Uma N. Dulhare ◽  
Shaik Rasool

Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.


Author(s):  
Punithavathi P ◽  
Geetha Subbiah

Images are becoming an inevitable part of knowledge in the modern day society. As data is growing at a rapid rate, costs involved in storing and maintaining data is also raising rapidly. The best alternate solution to reduce the storage cost is outsourcing all the data to the cloud. To ensure confidentiality and integrity of the data, a security technique has to be provided to the data even before it is stored on the cloud using cryptography. An attempt is made to explore the possibility of usage of visual cryptography for providing robust security to the secret image. Visual cryptography proves to be more efficient than other cryptography techniques because it is simple and does not require any key management technique.


Author(s):  
Poonkodi Mariappan ◽  
Padhmavathi B. ◽  
Talluri Srinivasa Teja

Digital Forensic as it sounds coerce human mind primarily with exploration of crime. However in the contemporary world, digital forensic has evolved as an essential source of tools from data acquisition to legal action. Basically three stages are involved in digital forensic namely acquisition, analysis and reporting. Digital Forensic Research Workshop (DFRW) defined digital forensic as “Use of Scientifically derived and proven method towards the identification, collection, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of event to be criminal”. The hard problem in digital forensic is such that the acquired data need to be cleaned and is required to be intelligible for reading by human. As a solution to this complexity problem a number of tools are present which may be repeated until relevant data is obtained.


Author(s):  
M. Sivabalakrishnan ◽  
R. Menaka ◽  
S. Jeeva

Video surveillance cameras are placed in many places such as bank, hospital, toll gates, airports, etc. To take advantage of the video in real time, a human must monitor the system continuously in order to alert security officers if there is an emergency. Besides, for event detection a person can observe four cameras with good accuracy at a time. Therefore, this requires expensive human resources for real time video surveillance using current technology. The trajectory of one or more targets obtains for object tracking while recording above space and time. By tracking various objects, the burden of detection by human sentinels is greatly alleviated. Efficient and reliable automatic alarm system is useful for many ATM surveillance applications. ATM Video monitoring systems present many challenging research issues in human abnormal behaviors detection approaches. The framework of ATM video surveillance system encompassing various factors, such as image acquisition, background estimation, background subtraction, segmentation, people counting and tracking are briefly discussed in this chapter.


Author(s):  
Sree Krishna Bharadwaj H.

Cybercrimes are those crimes which are associated with the latest technology including internet. There are various forms of committing crimes using the internet. As a result newer forms of crimes have emerged in the society. Some of the newer crimes are traditional crimes which are committed through the internet such as defamation, fraud, harassment, trespass etc. It is necessary to understand what the laws in India suggest towards these kind of newer crimes happening in the society. This paper deals with the types of cybercrimes and also provides the offences and punishments under the Information Technology Act, 2000 in India.


Author(s):  
Kavisankar L. ◽  
Chellappan C. ◽  
Poovammal E.

In the context of network security, a spoofing attack is a condition in which one person or a program successfully masquerades as another. This is done by providing counterfeit data with the malicious intention of gaining an illegitimate advantage. Spoofing attack which may be generated in various layer of Open Systems Interconnection model (OSI model) is discussed in this chapter. The chapter ends with discussing about the possible spoofing attacks in network layer and the relevant defense mechanism of the same. The detailed analysis and discussion is made on the spoofing attack over the Network layer because, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks more devastating while using network protocol like Internet Protocol (IP) which have become more of a threat than ever for the past few years.


Author(s):  
Gayathri RajaKumaran ◽  
NeelaNarayanan Venkataraman

In the Internet Era, millions of computer systems are connected to the Internet and the number is increasing infinitely. Maintaining proper Control and configuration for all such networked systems has proved to be impossible. This loophole makes the Internet systems vulnerable to various type of attacks. The objective of this research is to systematically identify a wide list of attacks in transport, session and application layers (Host layers). 148 effective controls are identified for the security attacks in addition to the 113 standard controls. The identified controls are analyzed in order to map and categorize them to the corresponding security layers wise.


Author(s):  
Geogen G. ◽  
Poovammal E.

Why should everyone know about mobile malware? With the introduction of Internet of Things (IoT) and Cloud, you can't survive in a disconnected world. Thus from your home appliances to your window curtains, everything is connected to Internet which can be accessed through your hand held mobile device. Unlike Personal Computers, these devices give Hackers a greater attack landscape. Back in 2004, when the first mobile malware was introduced, we never thought that it would get such a big threat space, as we see today. So, we discuss the History of Mobile malwares and its categories with its motives. We also discuss few signs that indicate the presence of a mobile malware. To conclude we categorize the battle against malware into two namely prevention and response, which is forensically analysed using Static/Dynamic Methods/Tools.


Sign in / Sign up

Export Citation Format

Share Document