Skip to main content

2018 | OriginalPaper | Buchkapitel

A Step Towards Internet Anonymity Minimization: Cybercrime Investigation Process Perspective

verfasst von : Shweta Sankhwar, Dhirendra Pandey, R. A. Khan

Erschienen in: Information and Decision Sciences

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, people are heading towards an era where the use of personal devices such as Personal Digital Assistant, laptops and wireless networks is increasing. Users operate their personal devices to gain benefit from resources and services offered by the Internet. Sometimes, these Internet activities are susceptible to cybercrimes and their consequences can be as harmful as common physical crime. Cyber-criminals use fake geographical locations to commit frauds and easily get away without eroding their anonymity. The geographical location information should be mandatory to gain access control. Authentication of user’s geographical location (geolocation) can be helpful in enhancing network security and control access to resources. In this paper, IP address is used to authenticate user’s graphical location and some of its extended properties which can be used as a weapon to avoid users from entering fake geographical locations while using Internet services, so as to improve safety and decreasing cybercrimes. The proposed model takes proactive investigations to uncover cybercrimes and cyber-criminals who are actively engaged in cybercrime.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sitaraman, A., Dos Santos, M.A., Lou, S., Zhang, S., Sthothra Bhasham, S.K.: Integrated IP address management. U.S. Patent 6,427,170, issued 30 July 2002 Sitaraman, A., Dos Santos, M.A., Lou, S., Zhang, S., Sthothra Bhasham, S.K.: Integrated IP address management. U.S. Patent 6,427,170, issued 30 July 2002
2.
Zurück zum Zitat Schmidt, G.T.: INS/GPS technology trends. Massachusetts Institute of Technology, Lexington, MA (2010) Schmidt, G.T.: INS/GPS technology trends. Massachusetts Institute of Technology, Lexington, MA (2010)
3.
Zurück zum Zitat Kao, D.-Y., Wang, S.-J.: The IP address and time in cyber-crime investigation. Polic.: Int. J. Police Strateg. Manag. 32(2), 194–208 (2009)CrossRef Kao, D.-Y., Wang, S.-J.: The IP address and time in cyber-crime investigation. Polic.: Int. J. Police Strateg. Manag. 32(2), 194–208 (2009)CrossRef
4.
Zurück zum Zitat Denning, D.E., MacDoran, P.F.: Location-based authentication: grounding cyberspace for better security. Comput. Fraud Secur. 1996(2), 12–16 (1996)CrossRef Denning, D.E., MacDoran, P.F.: Location-based authentication: grounding cyberspace for better security. Comput. Fraud Secur. 1996(2), 12–16 (1996)CrossRef
5.
Zurück zum Zitat Padmanabhan, V.N., Subramanian, L.: Determining the geographic location of Internet hosts. In: SIGMETRICS/Performance, pp. 324–325 (2001) Padmanabhan, V.N., Subramanian, L.: Determining the geographic location of Internet hosts. In: SIGMETRICS/Performance, pp. 324–325 (2001)
6.
Zurück zum Zitat Thorvaldsen, Ø.E.: Geographical location of internet hosts using a multi-agent system. Master’s thesis, Institutt for telematikk (2006) Thorvaldsen, Ø.E.: Geographical location of internet hosts using a multi-agent system. Master’s thesis, Institutt for telematikk (2006)
7.
Zurück zum Zitat Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: survey and research challenges. Digit. Investig. 7(1), 14–27 (2010)CrossRef Pilli, E.S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: survey and research challenges. Digit. Investig. 7(1), 14–27 (2010)CrossRef
8.
Zurück zum Zitat Zainudin, N.M., Merabti, M., Llewellyn-Jones, D.: A digital forensic investigation model for online social networking. In: Proceedings of the 11th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, pp. 21–22 (2010) Zainudin, N.M., Merabti, M., Llewellyn-Jones, D.: A digital forensic investigation model for online social networking. In: Proceedings of the 11th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, pp. 21–22 (2010)
9.
Zurück zum Zitat Poonia, A.S.: Analysis of existing models and proposed cyber crime investigation model. Analysis 10(11), 77–81 (2014) Poonia, A.S.: Analysis of existing models and proposed cyber crime investigation model. Analysis 10(11), 77–81 (2014)
10.
Zurück zum Zitat Satti, R.S., Jafari, F.: Reviewing existing forensic models to propose a cyber forensic investigation process model for higher educational institutes. Int. J. Comput. Netw. Inf. Secur. 7(5), 16 (2015) Satti, R.S., Jafari, F.: Reviewing existing forensic models to propose a cyber forensic investigation process model for higher educational institutes. Int. J. Comput. Netw. Inf. Secur. 7(5), 16 (2015)
Metadaten
Titel
A Step Towards Internet Anonymity Minimization: Cybercrime Investigation Process Perspective
verfasst von
Shweta Sankhwar
Dhirendra Pandey
R. A. Khan
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7563-6_27