Abstract
In this paper, we focus on a method of analysis of data in a digital communication channel, using the Digital Profiling technique. We believe, in fact, that the massive use of cloud computing and pervasive technology compels us to improve the results of investigative analysis, in case of cyber-crime, reducing the times of job and maximizing the outcome. The method suggested highlights relationships between flowing data in a digital communication channel and the behavioral models of a possible intruder that threaten that communication. We have chosen to use the two typical approaches adopted in literature: the Top-down to confirm the facts and the Bottom-up to to construct the hypotheses.
Chapter PDF
Similar content being viewed by others
References
Colombini, C., Colella, A.: Digital Profiling: A Computer Forensics Approach. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol. 6908, pp. 330–343. Springer, Heidelberg (2011)
Colombini, C., Colella, A.: Digital scene of crime: technique of profiling users. To appear in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, JoWUA (2012)
Aterno, S., Cajani, F., Costabile, G., Mattiucci, M., Mazzaraco, G.: Computer Forensics e Indagini Digitali. Manuale Tecnico-giuridico e Casi Pratici, Experta srl (2011)
Bejtlich, R.: The Tao of network security monitoring. Addison-Wesley (2005)
Shinder, D.L., Cross, M.: Scene of the Cybercrime, 2nd edn. Syngress Publishing (2008)
Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network Intrusion Detection. IEEE Network 8(3), 26–41 (1994)
Bace, R., Mell, P.: Intrusion Detection Systems. National Institute of Standards and Technology Special Publication on IDS (2001)
Laing, B.: How to guide: implementing a network based intrusion detection system (2001)
Roesch, M.: Snort - Lightweight Intrusion Detection System for Networks. In: 13th System Administration Conference - LISA 1999, Seattle, WA (1999)
Francesco, P., Ugo, F.: Network anomaly detection through nonlinear analysis. Computers & Security 29(7), 737–755 (2010)
Crosbie, M.J., Kuperman, B.A.: A building block approach to Intrusion Detection. In: RAID (2001)
Stephenson, P.R.: The application of Intrusion Detection Systems in a Forensic Environment. In: Recent Advances in Intrusion Detection - Raid, Toulose, France (2001)
Francesco, P., Ugo, F.: Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. Computers & Security 27(1-2), 48–62 (2008)
De Santis, A., Castiglione, A., Fiore, U., Palmieri, F.: An intelligent security architecture for distributed firewalling environments. Journal of Ambient Intelligence and Humanized Computing, 1–12 (2011), http://dx.doi.org/10.1007/s12652-011-0069-8
Francesco, P., Ugo, F.: Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system. Int. J. Wire. Mob. Compututer 2(1), 47–58 (2007)
Farinella, T.: Tecnologia database per l’analisi di log file di Web Server. Universita’ degli Studi di Modena e Reggio Emilia (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Colombini, C.M., Colella, A., Mattiucci, M., Castiglione, A. (2012). Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds) Multidisciplinary Research and Practice for Information Systems. CD-ARES 2012. Lecture Notes in Computer Science, vol 7465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32498-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-32498-7_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32497-0
Online ISBN: 978-3-642-32498-7
eBook Packages: Computer ScienceComputer Science (R0)