Skip to main content

Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Included in the following conference series:

  • 2101 Accesses

Abstract

Recently many autogenous terrors are occurred in many countries, and this kind of terrors are spread mostly through the Internet. Therefore, there should be regulations and tools to monitor suspicious Internet activities. Recently, due to the increased number of cyber terrors, many countries try to enact regulations against web server misuses. But, the establishment of such laws is slowed by the concerns of privacy of web users.

This paper proposed legislative measures against cyber terrors as well as the proposed scheme to collect terror-related information from web servers. The result of this research can reduce overall costs of anti-terror activities in the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Report: JFK terror plotters used Google Earth, http://news.com.com/8301-10784-3-9725253-7.html

  2. Canada Foils Attack, Arrests 17 Al-Qaida-Inspired Suspects, http://abclocal.go.com/kabc/story?section=nation_world&id=4233870

  3. Weimann, G.: Terror on the internet: The new arena, the new challenges, United States Institute for Peace, p. 309 (2006)

    Google Scholar 

  4. Estevez-Tapiador, J.: The emergence of cyber-terrorism. In: Distributed Systems Online, IEEE, Los Alamitos (2004)

    Google Scholar 

  5. Kim, I., Chung, Y., Lee, Y., Im, E.G., Won, D.: Information system modeling for analysis of propagation effects and levels of damage. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 54–63. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Kim, I., Chung, Y., Lee, Y., Won, D.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Proc. of ICCSA 2005. LNCS, vol. 3481, pp. 92–101. Springer, Heidelberg (2005)

    Google Scholar 

  7. Zittrain, J., Edelman, B.: Empirical analysis of internet filtering in china, Technical report, Berkman Center for Internet & Society at Harvard Law School (2003)

    Google Scholar 

  8. HR 3162, RDS, 107th CONGRESS 1st Session H. R. 3162, IN THE SENETE OF THE UNITED STSTES (October 24, 2001), http://www.epic.org/privacy/terrorism/hr3162.html

  9. Communications Assistance for Law Enforcement Act(CALEA), Pub. L. No. 103-414, 108 Stat. 4279 (1994), http://www.askcalea.net/

  10. Foreign Intelligence Surveillance Act (FISA), Pub. L. No 95-511, 92 Stat. 1783 (1978), http://www.eff.org/Censorship/Terrorism_militias/fisa_faq.html

  11. Anti-terrorism: Crime and Security Act, ISBN 0 10 542401 3 (2001), http://www.opsi.gov.uk/ACTS/acts2001/20010024.htm

  12. German court outlaws wiretapping without court order (August 10, 2005), http://www.edri.org/edrigram/number3.16/wiretapping

  13. Communications Surveillance (wiretapping and related activities) Act (2003), http://www.fipr.org/030818ripa.html

  14. Sander, T., Christian, F.: Tschudin, protecting mobile agents against malicious hosts. Mobile Agents and Security, pp. 44–60 (1998)

    Google Scholar 

  15. Jansen, W.A.: Countermeasures for mobile agent security. Computer Communications, Special Issue on Advanced Security Techniques for NetworkProtection (2000)

    Google Scholar 

  16. Bellavista, P., Corradi, A., Stefanelli, C.: A secure and open mobile agent programming environment. In: Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems (ISADS ’99), pp. 238–245 (1999)

    Google Scholar 

  17. Lee, Y., Kim, I., Kim, S., Won, D.: A method for detecting the exposure of ocsp responder’s session private key in d-ocsp-kis. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol. 3545, pp. 215–226. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, Springer, Heidelberg (1985)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, I.J., Lee, CW., Im, E.G. (2007). Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics