Discovering Cyber Terrorism Using Trace Pattern

Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cy...

Full description

Saved in:
Bibliographic Details
Main Authors: Nurhashikin, Mohd Salleh, Siti Rahayu, Selamat, Robiah, Yusof, Shahrin, Sahib
Format: Article
Language:en
Published: IJNS 2016
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/16997/2/ijns-2016-v18-n6-p1034-1040.pdf
http://eprints.utem.edu.my/id/eprint/16997/
http://ijns.jalaxy.com.tw/contents/ijns-v18-n6/ijns-2016-v18-n6-p1034-1040.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this paper proposes tracing technique for discovering cyber terrorism based on trace pattern. Trace pattern will represent the behavior and activities of cyber terrorism. Cyber terrorist's website is used as the datasets. Using tracing technique, cyber terrorist's activities are identified by extraction and classifying the traces to the keyword that is usually used by the terrorist. Then, the traces will be linked with the cyber terrorism components in order to identify the relationship between them. Using trace pattern, the verification process will be conducted to verify the traces in order to identify the cyber terrorism activities and potential terrorist. This trace pattern can be used in facilitating the forensic investigation process in discovering cyber terrorism activities.