首页> 外文期刊>Journal of Theoretical and Applied Information Technology >PROFILING FRAMEWORK IN IDENTIFYING CYBER VIOLENT EXTREMISM (CYBER-VE) ATTACK
【24h】

PROFILING FRAMEWORK IN IDENTIFYING CYBER VIOLENT EXTREMISM (CYBER-VE) ATTACK

机译:识别网络暴力极端主义(CYBER-VE)攻击的框架

获取原文
           

摘要

Cyber Violent Extremism (Cyber-VE) attack becomes topped at the international agenda and it still significant and concern to many governments in Southeast Asia and beyond. Cyber-VE becomes a threat to the country as the ongoing increase in online activities by the violent extremists group. The threat of Cyber-VE is still on the rise and the existing counters do not seem to be reducing this attack. Hence, the aim of this paper is to propose a new profiling framework in profiling Cyber-VE activities. This paper integrates between Cyber-VE traces classification and the components of criminology theory. Traces classification is generated through the process of identifying, extracting, and classifying traces. Two types of criminology theory which social are learning theory and space transition theory are used to explain and identify the criminal behavior. Then, both traces classification and criminology theory are integrated in order to develop the profiling framework. The proposed Cyber-VE profiling framework consists of three main processes which are data extraction and classification, Cyber-VE behavior identification, and Cyber-VE profile construction. The proposed profiling framework is evaluated and validated to verify its capabilities in profiling Cyber-VE activities. In experimental approach, the results from the dataset showed that the profiling framework is capable to profile Cyber-VE activities. In expert view, the results showed that the proposed profiling framework able to identify the activities that related to Cyber-VE attack. These findings will be used in helping the investigators in identifying any activities that related to Cyber-VE attack and help in profiling Cyber-VE attack.
机译:网络暴力极端主义(Cyber​​-VE)攻击已成为国际议事日程上的头等大事,它仍然很重要,并受到东南亚及其他地区许多政府的关注。随着暴力极端主义组织不断增加的在线活动,Cyber​​-VE对该国构成了威胁。 Cyber​​-VE的威胁仍在上升,现有的计数器似乎并没有减少这种攻击。因此,本文的目的是在剖析Cyber​​-VE活动时提出一个新的剖析框架。本文将Cyber​​-VE痕迹分类与犯罪学理论的组成部分进行了整合。跟踪分类是通过对跟踪进行识别,提取和分类的过程生成的。社会学的两种犯罪学理论即学习理论和空间过渡理论被用来解释和识别犯罪行为。然后,将痕迹分类和犯罪学理论相结合,以开发轮廓分析框架。拟议的Cyber​​-VE分析框架包括三个主要过程,分别是数据提取和分类,Cyber​​-VE行为识别和Cyber​​-VE配置文件构建。对提议的概要分析框架进行了评估和验证,以验证其在概要分析Cyber​​-VE活动中的能力。在实验方法中,数据集的结果表明,分析框架能够分析Cyber​​-VE活动。在专家看来,结果表明,建议的概要分析框架能够识别与Cyber​​-VE攻击相关的活动。这些发现将用于帮助调查人员确定与Cyber​​-VE攻击有关的任何活动,并有助于对Cyber​​-VE攻击进行概要分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号