网络犯罪调查外文翻译资料

 2023-03-13 03:03

网络犯罪调查

Yan ping Zhang1 , Yang Xiao1 *, Kaveh Ghaboosi2 , Jing yuan Zhang1 and Hong mei Deng3

1 Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487–0290, U.S.A.

2 Centre for Wireless Communications, University of Oulu, Finland

3 Intelligent Automation, Inc., 15400 Calhoun Drive, Suite 400, Rockville, MD 20855, U.S.A

摘要: 随着计算机和信息技术的进步,网络犯罪正在成为最重要的犯罪活动之一。执法机构面临的挑战。网络犯罪通常是指利用计算机或网络。了解网络犯罪的特征和性质对于帮助研究很重要社区找到有效预防它们的方法。大多数现有研究更侧重于攻击和攻击模型,包括对网络或计算机所有层的实际攻击或想象/可能的攻击,但已经有对网络犯罪的全面调查开展的工作较少。本文提供了对网络犯罪的调查实际发生。首先,将数字世界中的网络犯罪与物理世界中的犯罪进行比较。然后,网络犯罪是根据计算机或网络的作用分类的。此外,我们还注意到一些网络犯罪实际上是传统上由计算机或网络促成的非网络犯罪。令人惊讶的是,有如此多的反复出现的网络犯罪。需要做出更多努力来保护人们免受网络犯罪的侵害。

1、简介

随着计算机和信息的进步技术,网络犯罪现在正成为最执法机构面临的重大挑战。网络之间最重要的区别犯罪和人身犯罪是网络犯罪总是发生在数字或虚拟世界中;然而,这区别并没有将这两种类型的犯罪分开,并且它们有时相互牵连。

在现实世界中,犯罪是不可避免的,但可以 被各种机制最小化,例如 法规、法律、立法、警察等。同样,我们认为网络犯罪是不可避免的 并应受到法规、法律等的处罚。然而,在数字世界中,相关法律尚未出台成熟。仍然没有健全的法律来保护用户免受 由于网络犯罪的历史相对较短 信息技术和人们对此类犯罪的了解有限。由于网络犯罪的存在 数字世界,很难制定技术规律。因此,抓捕罪犯、惩治犯罪难度大。他们取证也难。

在数字世界中,损害总是远程造成的并且只能在很长时间后(或根本不会)被注意到。这损害类型与明显损害大不相同在物理社会中,例如人身伤害或财产损失。信息丢失或损坏并不总是那么明显或可观察为财务损失;数字中的这么多攻击世界是不容易被发现的。例如,许多用户或管理员没有意识到他们的计算机和网络被黑客入侵或攻击。其原因之一是网络犯罪不受物理访问限制的限制(例如明显的人身伤害或被盗物品)。相反,一个网络犯罪是隐蔽的。它可以通过不明显的有线或无线链接。大多数损害在物理世界只能由现场的罪犯造成尽管有一些远程犯罪,例如那些用导弹或其他远程武器进行的,需要财政和人力资源,因此普通罪犯不容易获得。然而,在数字世界,犯罪分子可以去任何地方世界和犯罪。另一个原因是电脑并且网络都已连接,因此熟练的攻击者可以从世界任何地方轻松访问它们而不是身体犯罪。

由于数字技术的短暂历史和网络,功能的实现(例如,信息管理、计算和通信)始终是主要目标而不是信息安全。 什么时候考虑系统硬件/软件、网络和相关服务/程序,安全方案设计不佳。网络犯罪的预防、检测和响应也尚未成熟。 因此,比较容易提交数字犯罪。网络犯罪通常被描述为犯罪活动使用现代信息技术,例如计算机技术、网络技术等。 都有各种网络犯罪,包括非法访问(例如hacking)、非法拦截、数据干扰、系统干扰、滥用设备、伪造(身份盗窃)、电子

欺诈等。

网络犯罪现在正成为一个严重的问题。许多研究人员投入了大量精力来保护

社会和人类免受网络犯罪的影响。最近的一个研究表明,每一个新的网络犯罪都会发生10 s 在英国。大约 324 万次攻击2006 年由网络犯罪分子实施的一些网络犯罪甚至在物理上超越了他们的同类世界。与此同时,专家估计约 90%网络犯罪未被报告。作为圣大学的心理学专家Francisco, S. McGuire 曾经做过一项研究,表明大多数青少年只入侵和侵入计算机系统为了好玩,而不是造成损害或伤害。这是经常父母无法理解的情况青少年黑客。她进行了一项匿名研究圣地亚哥地区 4800 多名学生和询问他们在未经授权的情况下操作计算机系统或网络资源的经历。正如美国心理学会发表的那样会议,结果如下:青少年参与软件盗版的比例约为 38%;这承认使用信息的年轻人的百分比在其他人的计算机/网站中大约为 18%;这在计算机中进行修订的人的百分比和文件大约是 13%;以及造成黑客攻击的百分比伤害或经济损失约为 10%。大多数青少年的非法计算机活动是由他们的好奇心或体验的享受。

通常,网络犯罪一词是指犯罪行为通过计算机或网络进行。 然而,它也适用于一些传统的犯罪行为计算机或网络的帮助。在后面的部分在本文中,我们将介绍网络的分类犯罪,并用详细的例子解释每个类。对于研究界来说,深入研究很重要了解网络犯罪并找到预防方法。大多数现有研究更侧重于攻击和攻击模型,涵盖实际攻击或想象/可能的攻击攻击网络或计算机的所有层,但有开展的综合调查工作较少网络犯罪。我们写这篇论文的动机是帮助人们实现综合分类和网络犯罪的例子。我们希望这篇论文能够帮助减少本文中列出的网络犯罪数量在不久的将来显着。在本文中,我们提供了一个对实际发生的网络犯罪的全面调查发生了。 我们比较数字世界中的网络犯罪与现实世界中的犯罪。 我们还对网络进行分类根据计算机或网络的作用犯罪。

在以下方面有许多相关的研究主题:各种攻击和漏洞,关键管理,回溯,椭圆曲线密码系统入侵检测,无线电频率识别安全,无线安全网络、身份验证、点对点安全对等网络和其他安全问题。本文的其余部分组织如下:在第 2 节中,我们提供网络犯罪的分类; 在第 3-7 节中,我们用例子详细说明每个类别; 我们得出结论第8节中的论文。

2、类别

计算机和网络的进步极大地助长了网络犯罪的蔓延。 根据计算机或网络在犯罪中的主要作用,网络犯罪分为以下六类。 我们在图 1 中绘制了这种分类。

(1) 计算机或网络被用作工具犯罪活动。这些是网络犯罪哪些计算机或网络主要用作工具,包括垃圾邮件和犯罪版权违规行为,尤其是那些通过点对点网络。

(2) 计算机或网络是犯罪分子的目标活动。这些是网络犯罪计算机或网络是犯罪分子的目标活动,包括未经授权的访问(即破坏访问控制)、恶意代码、病毒、拒绝服务 (DoS) 攻击和黑客攻击。

(3) 计算机或网络是犯罪分子的场所活动。这些是网络犯罪计算机或网络主要是犯罪活动,包括盗窃服务(在特别是电信欺诈)和某些财务欺诈。

(4) 计算机助长的传统犯罪或网络。许多传统犯罪成为当使用促进时更有害

计算机或网络。此类犯罪包括轻信或社会工程欺诈,例如作为网络钓鱼、身份盗窃、儿童色情、在线赌博、证券欺诈等。为了例如,网络跟踪是一种传统的犯罪骚扰,但它遵循不同的模式在计算机和网络的推动下。

(5)其他信息犯罪。此外,还有一些信息犯罪,例如商业秘密盗窃以及工业或经济间谍活动,在以下部分中,我们将详细介绍每个类别网络犯罪的例子。

hellip;hellip;

8、结论

存在许多不同类型的网络犯罪。 任何人都可能是 受到网络犯罪分子的攻击。 严重的攻击每时每刻都会发生 一天,我们应该有基本的准备和原则 保护我们自己。 意识是最好的防御,也可以安装防火墙来保护自己免受 许多攻击,可以避免安装未知软件。 在本文中,我们将网络犯罪分为几种不同的类并详细解释每个类别例子。这篇论文的主要目的是帮助人们意识到威胁和潜在的攻击并从中学习这些攻击是为了更好地保护自己。

外文文献出处:SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 5:422–437 Published online 13 July 2011 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.331

附外文文献原文 Sci-Hub | A survey of cyber crimes | 10.1002/sec.331 (yncjkj.com)

A survey of cyber crimes

Yan ping Zhang1 , Yang Xiao1 *, Kaveh Ghaboosi2 , Jing yuan Zhang1 and Hong mei Deng3

1 Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487–0290, U.S.A.

2 Centre for Wireless Communications, University of Oulu, Finland

3 Intelligent Automation, Inc., 15400 Calhoun Drive, Suite 400, Rockville, MD 20855, U.S.A

ABSTRACT

With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. Cyber crimes are generally referred as criminal activities that use computers or networks. An understanding of the characteristics and nature of cyber crimes is important in helping research communities find ways to effectively prevent them. Most existing research focuses more on attacks and attack models, including either actual attacks or imaginary/possible attacks over all layers of networks or computers, but there has been less work carried out on a comprehensive survey of cyber crimes. This paper provides a survey of cyber crimes that have actually occurred. First, cyber crimes in the digital world are compared with crimes in the physical world. Then, cyber crimes are categorized according to the roles of computers or networks. Furthermore, we also notice that some cyber crimes are actually traditionally non‐cyber crimes that are facilitated by computers or networks. It is surprising that there are so many recurrent cyber crimes. More efforts are needed to protect people from cyber crimes. Copyright copy; 2011 John Wiley amp; Sons, Ltd

KEYWORDS MAC security; IDS; forensics

*Correspondence Prof. Yang Xiao, Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487–0290, U.S.A. E‐mail: yangxiao@ieee.org

1. INTRODUCTION

With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. The most important difference between a cyber crime and a physical crime is that a cyber crime always happens i

剩余内容已隐藏,支付完成后下载完整资料


附外文文献原文 Sci-Hub | A survey of cyber crimes | 10.1002/sec.331 (yncjkj.com)

A survey of cyber crimes

Yan ping Zhang1 , Yang Xiao1 *, Kaveh Ghaboosi2 , Jing yuan Zhang1 and Hong mei Deng3

1 Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487–0290, U.S.A.

2 Centre for Wireless Communications, University of Oulu, Finland

3 Intelligent Automation, Inc., 15400 Calhoun Drive, Suite 400, Rockville, MD 20855, U.S.A

ABSTRACT

With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. Cyber crimes are generally referred as criminal activities that use computers or networks. An understanding of the characteristics and nature of cyber crimes is important in helping research communities find ways to effectively prevent them. Most existing research focuses more on attacks and attack models, including either actual attacks or imaginary/possible attacks over all layers of networks or computers, but there has been less work carried out on a comprehensive survey of cyber crimes. This paper provides a survey of cyber crimes that have actually occurred. First, cyber crimes in the digital world are compared with crimes in the physical world. Then, cyber crimes are categorized according to the roles of computers or networks. Furthermore, we also notice that some cyber crimes are actually traditionally non‐cyber crimes that are facilitated by computers or networks. It is surprising that there are so many recurrent cyber crimes. More efforts are needed to protect people from cyber crimes. Copyright copy; 2011 John Wiley amp; Sons, Ltd

KEYWORDS MAC security; IDS; forensics

*Correspondence Prof. Yang Xiao, Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487–0290, U.S.A. E‐mail: yangxiao@ieee.org

1. INTRODUCTION

With the advancement of computer and information technology, cyber crime is now becoming one of the most significant challenges facing law enforcement organizations. The most important difference between a cyber crime and a physical crime is that a cyber crime always happens in the digital or virtual world; however, this difference does not separate these two types of crimes, and they sometimes involve each other. In the physical world, crimes are unavoidable but can be minimized by all kinds of mechanisms, such as regulations, laws, legislation, police, and so forth. Similarly, we believe that cyber crimes are unavoidable and should be punished by regulations, laws, and so forth. However, in the digital world, related laws have yet to mature. There are still no sound laws to protect users from cyber crimes because of the relatively brief history of information technology and peoplersquo;s limited understanding of such crimes. Because of cyber crimesrsquo; existence in the digital world, it is difficult to make technical laws. Therefore, it is difficult to capture criminals and punish them. It is also difficult to collect evidence.

In the digital world, damages are always inflicted remotely and can only be noticed after a long time (or not at all). This type of damage is quite different from the obvious damages within physical society, such as personal injury or property loss. Information loss or damage is not always as obvious or observable as financial loss; so many attacks in the digital world are not easily detected. For example, many users or administrators do not realize that their computers and networks have been hacked or attacked. One reason for this is that a cyber crime is not restricted by physical access limitations (such as noticeable human injury or stolen articles). Instead, a cyber crime is stealthy. It can access a building via an unnoticeable wired or wireless link. Most damages in the physical world can only be caused by criminals at the scene, although there are some remotely conducted crimes, such as those conducted with missiles or other long‐range weapons, which need financial and human resources and are therefore not easily accessible to normal criminals. However, in the digital world, criminals can potentially go anywhere in the world and commit crimes. Another reason is that computers and networks are all connected so that a skillful attacker can access them from anywhere in the world with much less effort than in physical crimes.

Due to the brief history of digital technology and networks, the achievement of functions (e.g., information management, computation, and communication) is always the main target instead of information security. When considering system hardware/software, network, and related services/programs, security schemes are not well designed. Cyber crime prevention, detection, and response have also yet to mature. Therefore, it is relatively easy to commit digital crimes. Cyber crime generally is described as criminal activities that use modern information technology, such as computer technology, network technology, and so forth. There are all kinds of cyber crimes, including illegal access (such as hacking), illegal interception, data interference, systems interference, misuse of devices, forgery (ID theft), electronic fraud, and so forth [1]. Cyber crime is now becoming a serious concern. Many researchers put a great deal of energy into protecting society and human beings from cyber crimes. One recent study showed that a new cyber crime is committed every 10 s in Britain [2]. About 3.24 million attacks [2] were conducted by cyber criminals in 2006. Some online crimes have even surpassed their equivalents in the physical world. In the meantime, experts estimate that about 90% of the cyber crimes go unreported [2]. As a specialist in psychology at the University of San Francisco, S. McGuire o

剩余内容已隐藏,支付完成后下载完整资料


资料编号:[596688],资料为PDF文档或Word文档,PDF文档可免费转换为Word

您需要先支付 30元 才能查看全部内容!立即支付

课题毕业论文、文献综述、任务书、外文翻译、程序设计、图纸设计等资料可联系客服协助查找。