DocumentCode
2595887
Title
Rule Based Evidence Mining for Network Attack
Author
Jayasingh, B.B. ; Patra, M.R.
Author_Institution
CVR Coll. of Eng., Ibrahimpatan
fYear
2007
fDate
17-20 Dec. 2007
Firstpage
23
Lastpage
28
Abstract
Today the Internet technology has made it possible to form virtual communities in the cyber space thereby facilitating different types of electronic transactions. There is also a negative force to this technology, which is trying to threaten the security aspects. In order to guard against such threats one must adopt a well-planned approach and apply it systematically. In this paper, an in-depth study of major security threats are made and a decision tree has been built for evidence mining to help the law enforcement agencies and establish network crimes.
Keywords
Internet; computer crime; criminal law; data mining; decision trees; Internet technology; cyber space; decision tree; electronic transactions; law enforcement agencies; network attack; network crimes; rule based evidence mining; security threats; virtual communities; Autopsy; Computer crime; Computer networks; Forensics; Information analysis; Internet; Law enforcement; Monitoring; Protocols; Space technology;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology, (ICIT 2007). 10th International Conference on
Conference_Location
Orissa
Print_ISBN
0-7695-3068-0
Type
conf
DOI
10.1109/ICIT.2007.47
Filename
4418261
Link To Document