Discovering Cyber Terrorism Using Trace Pattern

Nurhashikin, Mohd Salleh and Siti Rahayu, Selamat and Robiah, Yusof and Shahrin, Sahib (2016) Discovering Cyber Terrorism Using Trace Pattern. International Journal Of Network Security, 18 (6). pp. 1034-1040. ISSN 1816-353X

[img] Text
ijns-2016-v18-n6-p1034-1040.pdf - Published Version

Download (551kB)

Abstract

Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this paper proposes tracing technique for discovering cyber terrorism based on trace pattern. Trace pattern will represent the behavior and activities of cyber terrorism. Cyber terrorist's website is used as the datasets. Using tracing technique, cyber terrorist's activities are identified by extraction and classifying the traces to the keyword that is usually used by the terrorist. Then, the traces will be linked with the cyber terrorism components in order to identify the relationship between them. Using trace pattern, the verification process will be conducted to verify the traces in order to identify the cyber terrorism activities and potential terrorist. This trace pattern can be used in facilitating the forensic investigation process in discovering cyber terrorism activities.

Item Type: Article
Uncontrolled Keywords: Critical national information infrastructure (CNII), cyber terrorism, trace pattern, tracing technique
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Mohd Hannif Jamaludin
Date Deposited: 16 Aug 2016 02:59
Last Modified: 07 Sep 2021 17:03
URI: http://eprints.utem.edu.my/id/eprint/16997
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item