Cybercrime Countermeasure of Insider Threat Investigation
Title | Cybercrime Countermeasure of Insider Threat Investigation |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | KAO, Da-Yu |
Conference Name | 2019 21st International Conference on Advanced Communication Technology (ICACT) |
Publisher | IEEE |
ISBN Number | 979-11-88428-02-1 |
Keywords | Big Data, Computer crime, cybercrime countermeasure, cybercrime insider investigation, cybercrime investigation, cybercrime threats, deep packet inspection, deep packet inspection methods, digital evidence, digital investigation process, DPI method, insider threat, insider threat investigation, Inspection, law enforcement, Online banking, Organizations, pubcrawl, resilience, Resiliency, Scalability |
Abstract | The threat of cybercrime is becoming increasingly complex and diverse on putting citizen's data or money in danger. Cybercrime threats are often originating from trusted, malicious, or negligent insiders, who have excessive access privileges to sensitive data. The analysis of cybercrime insider investigation presents many opportunities for actionable intelligence on improving the quality and value of digital evidence. There are several advantages of applying Deep Packet Inspection (DPI) methods in cybercrime insider investigation. This paper introduces DPI method that can help investigators in developing new techniques and performing digital investigation process in forensically sound and timely fashion manner. This paper provides a survey of the packet inspection, which can be applied to cybercrime insider investigation. |
URL | https://ieeexplore.ieee.org/document/8702029 |
DOI | 10.23919/ICACT.2019.8702029 |
Citation Key | kao_cybercrime_2019 |
- DPI method
- Scalability
- Resiliency
- resilience
- pubcrawl
- Organizations
- Online banking
- law enforcement
- Inspection
- insider threat investigation
- insider threat
- Big Data
- digital investigation process
- digital evidence
- deep packet inspection methods
- deep packet inspection
- cybercrime threats
- cybercrime investigation
- cybercrime insider investigation
- cybercrime countermeasure
- Computer crime