Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore

نویسندگان

  • Christopher Ting
  • Tiang Hwee Ong
  • Yong Tai Tan
  • Pek Yong Ng
چکیده

In this article, we propose a framework to accelerate the ubiquitous capitalization of Internet as a vehicle to merchandise goods and services. The motivation for proposing this framework derives from the fact that many consumers and small-to-medium-sized companies are still hesitant to use Internet to shop, trade and disclose sensitive information such as credit card numbers. While IT security technologies and products are widely available, there are still gaps that have to be filled in before Internet becomes a truly viable and profitable channel to do business. The business model that we propose is anchored upon the trilogy of three elements, which are interwoven and indispensable. We believe that to do business over the cyberspace, IT security technologies need to be complemented by financial and law enforcement instruments. We propose and present the case that Intrusion Detection, Internet Law Enforcement and Insurance Coverage (I3) can fill the gaps, both from the technical as well as non-technical standpoints. Just like Command, Control and Communications (C3) are indispensable in any military operations, I3 are critical to creating a trusted environment for Internet Business. The highlight of the I3 framework is an Agent-based Monitoring, Intrusion Detection And Response (AMIDAR) system. AMIDAR is proposed to enable the law enforcement agency to “police” the cyberspace effectively, so that both the virtual shop owners and the consumers feel secure to buy and sell on the Internet. For the insurance underwriters, AMIDAR forms the basis to gain insights into the residual risk, and to draw up realistic insurance policies that sell well. We also point out that risk assessment, automated systems configuration checking as well as computer forensics are the associated technologies to help make the I3 business model feasible. Another novelty is the shopping protocol. It is designed to raise the level of assurance to the proposed I3 framework against fraud. We hope that the I3 framework with the associated shopping protocol can turn the Internet into a market place.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999