Académique Documents
Professionnel Documents
Culture Documents
Presented By:
Keshav Kumar Meena CS-B (8th sem) 09ESKCS201
Outline
Introduction
Cybercrime Types of cybercrime Problems in cybercrime investigation Techniques of investigation method Conclusions Future Directions
Introduction
Internet has offered us a much more convenient way to share information across time and place. Cyberspace also opened a new venue for criminal activities.
Cyber attacks Distribution of illegal materials in cyberspace Computer-mediated illegal communications within big
Cybercrime has become one of the major security issues for the law enforcement community.
Cybercrime
Definition:
Illegal computer-mediated activities that can be conducted
intent in cyberspace. These fall into three slots:1. Against persons. 2. Against business and non-business organizations. 3. Crime targeting the government.
Data collection
Huge amount of online document
Rule Forming
Difficult to discern illegal document
Identity Tracing
Difficult to trace identities due to the anonymity of cybercrime
Hi-tech Cops
Computer forensic investigators have software and
electronic device that allow them to track and collect evidence against online criminals.
Authorities
used these techniques to catch child pornographers and hackers, whose tools of trade include bots worms viruses or malware causing billions Of dollars in damage annually .
intercept real time on line communication. This is part of the federal wire tap law which were beefed up after the september 11 terrorist attacks. Forensic techniques also can used techniques that allow them to decode encryptions and passwords on suspects seized computer.
Cyber Squad
The FBI and U.S. department of justice head unit focused
on internet criminal The cyber crime unit uses computer experts and investigate tools in its effort to fight computer intrusion and the spread of malicious code, child pornogropher and hackers. The FBI also uses infragard a program in which government investigators partner with technology industries to share and gather information on cyber crime.
Online Undercover
Agent often pose as children in internet set room hopping
to lure pedophiles. Who often are arrested after setting up metting to with some one. They must believe to be a child.
users. But must wait for another visitor to pursue sexual conversations and meeting with what are believed to be minors.
4. After opening the website of any of above mentioned search engine, feed the IP number and after some time name of ISP can be obtained.
5. After getting the name of ISP we can get the information about the sender from the ISP by giving them the IP number, date and time of sender. 6. ISP will provide the address and phone number of the system, which was used to send the mail with bad intention. 7. After Knowing the address and phone number criminal can be apprehended by using conventional police methods.
Conclusions
The experimental results indicated a promising future for applying the analysis approaches in cybercrime investigation to address the identitytracing problem. Structural features are significant discriminators for online documents. SVM and neural network techniques achieved high performance. This approach is promising in the multilingual context.
Future Directions
More illegal messages will be incorporated into our testbed. The current approach will be extended to analyze the investigation of other cybercrime-related materials, such as bomb threats, hate speeches, and childpornography. Another more challenging future direction is to automatically generate an optimal feature set which is specifically suitable for a given dataset.