Designing a Data Warehouse for Cyber Crimes
نویسندگان
چکیده
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on the data warehouse. We discuss several ways of utilizing the data warehouse using OLAP and data mining technologies. We finally discuss legal issues and data population issues for the data warehouse.
منابع مشابه
PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes
Nowadays, cyber crimes are increasing and have affected large organizations with highly sensitive information. Consequently, the affected organizations spent more resources analyzing the cyber crimes rather than detecting and preventing these crimes. Network forensics plays an important role in investigating cyber crimes; it helps organizations resolve cyber crimes as soon as possible without i...
متن کاملCyber Crime and its Related Aspects under I.T. Act, 2000 and its Prevention
Cyber Crimes are increasing day by day and are posing a great threat to internet users. This paper discusses the Cyber crime, its nature and types. Various tools and techniques used for cyber crime are evaluated in this paper. The paper also discusses cyber related laws under Indian Penal Code and their application to the cyber offences. With the discussion of cyber crimes, this paper proposes ...
متن کاملIntroduction to the Cyber-of-Things: Cyber-crimes and Cyber-Security Mini-track
The continuous amalgamation of technology into the ever increasing facets of everyday life are conducive to encouraging cyber-crimes and cybersecurity evolution and diversification. Hence, responses that address resulting concerns presented in this mini-track include ‘A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams’, ‘A ThreatVulnerability Bas...
متن کاملBook Review of Cyber Criminology: Exploring Internet Crimes and Criminal Behavior
As cyber crime has proliferated exponentially across the globe, those in the criminal justice field have lacked suitable and updated knowledge concerning the pedestrian reality of modern cyber crime. Popular media has created an image of cyber crime that suggests a lone hacker breaking through seemingly impossible security measures to access lucrative secret data. Crimes like these are very rar...
متن کاملCyber-Crimes and the Boundaries of Domestic Legal Responses: Case for an Inclusionary Framework for Africa
As the world marches deeper into the unknown passageway of digital revolution, it is becoming apparent that the tremendous benefits of the internet age are being challenged by the formidable menace of cyber-crime, not the least in the African region. While African States vary in the degree to which their economies and peoples are affected by cyber-crime, there is no gainsaying the fact that the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JDFSL
دوره 1 شماره
صفحات -
تاریخ انتشار 2006