2012
DOI: 10.1007/978-3-642-32498-7_31
|View full text |Cite
|
Sign up to set email alerts
|

Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel

Abstract: Part 2: WorkshopInternational audienceIn this paper, we focus on a method of analysis of data in a digital communication channel, using the Digital Profiling technique. We believe, in fact, that the massive use of cloud computing and pervasive technology compels us to improve the results of investigative analysis, in case of cyber-crime, reducing the times of job and maximizing the outcome. The method suggested highlights relationships between flowing data in a digital communication channel and the behavioral … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2
1

Relationship

3
2

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…every attack is specially customized to the characteristics of the systems to hit, with the aim to reach a specific advantage; the implementation of the attack will be different for each attack; the impact of the caused damage is publicly revealed with a lag: as with all crimes, the victim is not willing to reveal his vulnerability; source and path are difficult to find, because their authors can take advantage of the anonymity offered by the cyberspace; it is often used as part of a larger conventional attack in support of it within a conflict, to gain more advantage over the enemy [12].…”
Section: Threat Analysismentioning
confidence: 99%
“…every attack is specially customized to the characteristics of the systems to hit, with the aim to reach a specific advantage; the implementation of the attack will be different for each attack; the impact of the caused damage is publicly revealed with a lag: as with all crimes, the victim is not willing to reveal his vulnerability; source and path are difficult to find, because their authors can take advantage of the anonymity offered by the cyberspace; it is often used as part of a larger conventional attack in support of it within a conflict, to gain more advantage over the enemy [12].…”
Section: Threat Analysismentioning
confidence: 99%
“…For instance the well known concept of media write-blocking during the acquisition cannot be applied to network forensics. Moreover the availability of high speed networks, the widespread of mobile devices or smart phones [7], [8], the growing use of OSN and online services [9] lead us to believe that an increasing number of relevant digital evidence will be available on the network [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…The analysis of these new properties, together with the old ones, allow us to extrapolate the behavior of a cyber weapon. Therefore, the results of the cyber-profile are composed by a series of information that can be used as "filters" for the monitoring and the analysis of data streams [5], [15], in order to have a more efficient identification of the actors of a cyber conflict. In fact, this type of profile allows a real-time awareness of possible situations of attack and facilitate the implementation of an effective dynamic system of cyber defense.…”
Section: Profiling the Cyberspacementioning
confidence: 99%