Skip to main content

2016 | OriginalPaper | Buchkapitel

A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime

verfasst von : Singh Rashmi, Saxena Vipin

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the current scenario, distributed computing systems play significant role for accessing the various kinds of internet services. The different handheld devices like palmtop, laptop, mobile, etc. can be connected across the distributed network. People enjoy social networking websites, online purchasing websites, and online transaction websites in the daily routine life. On the other hand, hackers are regularly watching the activities of the people who are categorized as the authorized users connected across the globe. The present work is related to propose a model which is based upon the object-oriented technology for occurring of cyber crime across the distributed network. A well known Unified Modeling Language is used and one can easily write the code for implementation of model in any object-oriented programming language. After that a UML model is proposed for filing the FIR online against the cyber crime. The activities in the above procedure are represented by the UML activity diagram which is finally validated through the concept of finite state machine.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat OMG, Unified Modeling Language (UML)-Version1.5, OMG document formal/2003-3-01, (2003), Needham, MA. OMG, Unified Modeling Language (UML)-Version1.5, OMG document formal/2003-3-01, (2003), Needham, MA.
3.
Zurück zum Zitat Booch G., Rambaugh J., and Jacobson I.: The Unified Modeling Language User Guide, Twelfth Indian Reprint, Pearson Education, 2004. Booch G., Rambaugh J., and Jacobson I.: The Unified Modeling Language User Guide, Twelfth Indian Reprint, Pearson Education, 2004.
4.
Zurück zum Zitat Booch G., Rumbaugh J., and Jacobson I.: The Unified Modeling Language User Guide”, China Machine Press, Beijing, 2006. Booch G., Rumbaugh J., and Jacobson I.: The Unified Modeling Language User Guide”, China Machine Press, Beijing, 2006.
5.
Zurück zum Zitat Feltus C., Khadraoui D. and Aubert J.: A security decision- reaction architecture for heterogeneous distributed network, published in Availability, Reliability and Security, publisher IEEE, pp. 1–8, Feb 2010. Feltus C., Khadraoui D. and Aubert J.: A security decision- reaction architecture for heterogeneous distributed network, published in Availability, Reliability and Security, publisher IEEE, pp. 1–8, Feb 2010.
6.
Zurück zum Zitat Ping S. P.: An Improved Model of Distributed Network Information Security, published in Educational and Information Technology, publisher IEEE, Vol. 3, Sept 2010. Ping S. P.: An Improved Model of Distributed Network Information Security, published in Educational and Information Technology, publisher IEEE, Vol. 3, Sept 2010.
7.
Zurück zum Zitat Subashini S., Kavitha V.: A Survey on Security Issues in Services in Delivery Models of Cloud Computing, Journal of Network and Computer Applications, Elsevier publication, Vol. 34, pp. 1–11, Jan 2011. Subashini S., Kavitha V.: A Survey on Security Issues in Services in Delivery Models of Cloud Computing, Journal of Network and Computer Applications, Elsevier publication, Vol. 34, pp. 1–11, Jan 2011.
8.
Zurück zum Zitat Goyette, R. Karmouch, A.: A Dynamic Model Building Process for Virtual Network Security Assessment, published in IEEE conference, pp. 482–487, Aug 2011. Goyette, R. Karmouch, A.: A Dynamic Model Building Process for Virtual Network Security Assessment, published in IEEE conference, pp. 482–487, Aug 2011.
9.
Zurück zum Zitat White, Gregory B.: The Community Cyber Security Maturity Model” IEEE publication, pp. 173–178 Nov 2011. White, Gregory B.: The Community Cyber Security Maturity Model” IEEE publication, pp. 173–178 Nov 2011.
10.
Zurück zum Zitat Sekgwathe V. AND Talib M.: Cyber Crime Detection and Protection: Third World Still to Cope-Up, published by Springer, vol. 171, PP. 171–181, 2011. Sekgwathe V. AND Talib M.: Cyber Crime Detection and Protection: Third World Still to Cope-Up, published by Springer, vol. 171, PP. 171–181, 2011.
11.
Zurück zum Zitat Dimitrios Z. and Dimitrios L.: Addressing Cloud Computing Security Issues, Future Generation Computer System, Elsevier publication, Vol. 28, pp. 583–592, March 2012. Dimitrios Z. and Dimitrios L.: Addressing Cloud Computing Security Issues, Future Generation Computer System, Elsevier publication, Vol. 28, pp. 583–592, March 2012.
12.
Zurück zum Zitat Zhang Y., Xiao Y. et al: A Survey of Cyber Crimes, published in Journal Security and Communication Networks, Vol. 5, pp. 422–437, April 2012. Zhang Y., Xiao Y. et al: A Survey of Cyber Crimes, published in Journal Security and Communication Networks, Vol. 5, pp. 422–437, April 2012.
13.
Zurück zum Zitat Jain M., Vasavada J., Jain G. And Patel P.: Information Security and Auditing for Distributed Network, published in Instrumentation & Measurement, Sensor Network and Automation, publisher IEEE, Vol. 2, Aug 2012. Jain M., Vasavada J., Jain G. And Patel P.: Information Security and Auditing for Distributed Network, published in Instrumentation & Measurement, Sensor Network and Automation, publisher IEEE, Vol. 2, Aug 2012.
14.
Zurück zum Zitat Bhadauria R. And Sanyal S.: Servey on Security Issues in Cloud Computing and Associated Mitigation Techniques, published by An International Journal of Computer Applications, Vol. 47, 2012. Bhadauria R. And Sanyal S.: Servey on Security Issues in Cloud Computing and Associated Mitigation Techniques, published by An International Journal of Computer Applications, Vol. 47, 2012.
15.
Zurück zum Zitat Fang F., Xiaoyan L. And Jia W.: Network Security Situation Evaluation Method for Distributed Denial of Service, published in IMCCC, Publisher IEEE, pp. 16–21, Dec 2012. Fang F., Xiaoyan L. And Jia W.: Network Security Situation Evaluation Method for Distributed Denial of Service, published in IMCCC, Publisher IEEE, pp. 16–21, Dec 2012.
16.
Zurück zum Zitat Hooper C., Martine B. and Choo K.K.R.: Cloud Computing and its implications for cybercrime investigations in Australia, Published by Elsevier, 29, pp. 152–163, 2013. Hooper C., Martine B. and Choo K.K.R.: Cloud Computing and its implications for cybercrime investigations in Australia, Published by Elsevier, 29, pp. 152–163, 2013.
17.
Zurück zum Zitat Safavi S., Shukar Z. and Razali R.: Reviews on Cybercrime Affecting Portable Devices, Published by Elsevier, 11, pp. 650–657, 2013. Safavi S., Shukar Z. and Razali R.: Reviews on Cybercrime Affecting Portable Devices, Published by Elsevier, 11, pp. 650–657, 2013.
18.
Zurück zum Zitat Kallberg J.: Aright to Cybercounter Strikes: The Risks of Legalizing Hack Back, in IT Professionals, Vol. 17, no. 1, pp. 30–35, Jan–Feb 2015. Kallberg J.: Aright to Cybercounter Strikes: The Risks of Legalizing Hack Back, in IT Professionals, Vol. 17, no. 1, pp. 30–35, Jan–Feb 2015.
19.
Zurück zum Zitat Heckman K.E., Stech F.J., Schmoker B.S. and Thomas R.K.: Denial and Deception in Cyber Defense, in Computer, Vol. 48, no. 4, pp. 36–44, Apr. 2015. Heckman K.E., Stech F.J., Schmoker B.S. and Thomas R.K.: Denial and Deception in Cyber Defense, in Computer, Vol. 48, no. 4, pp. 36–44, Apr. 2015.
20.
Zurück zum Zitat Kumar N., Singh R. and Saxena V.: Modeling and Minimization of Cyber Attack through Optimization Techniques, An International Journal of Computer Application. 99(1), pp. 30–34, 2014. Kumar N., Singh R. and Saxena V.: Modeling and Minimization of Cyber Attack through Optimization Techniques, An International Journal of Computer Application. 99(1), pp. 30–34, 2014.
Metadaten
Titel
A Unified Modeling Language Model for Occurrence and Resolving of Cyber Crime
verfasst von
Singh Rashmi
Saxena Vipin
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2755-7_71

Premium Partner