a case study of surveillance and prevention of digital crime /
نام نخستين پديدآور
Aamo Iorliam.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Cham, Switzerland :
نام ناشر، پخش کننده و غيره
Springer Nature,
تاریخ نشرو بخش و غیره
2019.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource
فروست
عنوان فروست
SpringerBriefs in Cybersecurity
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro; Foreword; Preface; Acknowledgements; Contents; 1 Introduction; 1.1 Main Contributions; 1.2 Document Structure; 2 Natural Laws (Benford's Law and Zipf's Law) for Network Traffic Analysis; 2.1 Contribution; 2.2 Benford's Law; 2.3 Zipf's Law; 2.4 Network Traffic Analysis and IDS; 2.4.1 Flow-Based IDS; 2.5 Network Flows and TCP Flows; 2.6 Application to Network Traffic Analysis; 2.6.1 Method Description; 2.6.2 The Metrics; 2.6.3 Analysis of Different Flow Ordering Options; 2.7 Experimental Setup and Results; 2.7.1 Datasets Used for Our Experiments; 2.7.2 Flow Size or Flow Size Difference
متن يادداشت
2.7.3 How to Determine Flow Window Size2.7.4 TCP Flow Ordering; 2.7.5 More Results on Different Datasets; 2.7.6 Zipf's Law for Network Traffic Analysis; 2.7.7 Zipf's Law for Malicious, Non-malicious, Mixture of Malicious and Non-malicious Network Traffic; 2.7.8 Comparative Analysis of Zipf's Law and Benford's Law with Implications; 2.8 Conclusion; References; 3 Combination of Natural Laws (Benford's Law and Zipf's Law) for Fake News Detection; 3.1 Combination of Benford's Law and Zipf's Law for Fake News Detection; 3.2 Results and Discussions; 3.3 Conclusion; References
متن يادداشت
4 Cybersecurity and Mobile Device Forensic4.1 Nigeria and Internet Fraud; 4.2 Reasons for Increase in Cyber Crimes in Nigeria; 4.3 Types of Cyber Crimes in Nigeria; 4.4 Link Between Mobile Device Forensics and Cybersecurity; 4.5 Cybersecurity Laws and Punishment in Nigeria; 4.6 Conclusion; References; 5 Proposed Digital Surveillance Software; 5.1 Introduction; 5.2 System Analysis and Design; 5.3 Product Features and How It Works; 5.4 The Solution (A-BOT); 5.5 Advantages of the Proposed System; 5.6 Conclusion; References
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country?s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria?s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria?s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford?s Law and Zipf?s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9783030152109
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Cybersecurity in Nigeria.
شماره استاندارد بين المللي کتاب و موسيقي
9783030152093
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer networks-- Security measures-- Nigeria.
موضوع مستند نشده
Computer security-- Nigeria.
موضوع مستند نشده
Computer networks-- Security measures.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
COMPUTERS-- Networking-- Security.
موضوع مستند نشده
COMPUTERS-- Security-- General.
موضوع مستند نشده
COMPUTERS-- Security-- Online Safety & Privacy.
نام جغرافیایی به منزله موضوع
موضوع مستند نشده
Nigeria.
بدون عنوان
7
مقوله موضوعی
موضوع مستند نشده
COM-- 043050
موضوع مستند نشده
COM-- 053000
موضوع مستند نشده
COM-- 060040
رده بندی ديویی
شماره
005
.
8
ويراست
23
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )