A New Profiling Framework In Identifying Cyber Violent Extremism Attack
Violent extremism has become a serious issue and an area of interest to government as it could leave difficult conditions to the nation. Violent extremism happens when someone chooses to carry out violent method and intent to cause harm to other. These groups of extremists aim to cause as much damag...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2018
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/23328/1/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf http://eprints.utem.edu.my/id/eprint/23328/2/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utem-ep.23328 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Teknikal Malaysia Melaka |
collection |
UTeM Repository |
language |
English English |
advisor |
Selamat, Siti Rahayu |
topic |
H Social Sciences (General) H Social Sciences (General) |
spellingShingle |
H Social Sciences (General) H Social Sciences (General) Mohd Salleh, Nurhashikin A New Profiling Framework In Identifying Cyber Violent Extremism Attack |
description |
Violent extremism has become a serious issue and an area of interest to government as it could leave difficult conditions to the nation. Violent extremism happens when someone chooses to carry out violent method and intent to cause harm to other. These groups of extremists aim to cause as much damage as possible when they intent to create harm to the target. Internet as the medium of communication has led to the formation of cyber communities which attracts violent extremism group. Recently, the violent extremism group uses the Internet as their platform to form online communities and launch their attack, these activities known as Cyber Violent Extremism (Cyber-VE). The ongoing increase in online activities by violent extremist groups along with the lack of mechanisms that can be used to identify violent extremism activity could be considered as a major problem. The threat of Cyber-VE is still on the rise and the existing mechanism do not seem to be reducing this attack. Therefore, the aim of this research is to develop a new profiling framework to help forensic investigators in identifying any activities that related to Cyber-VE attack. This done by integrating the classification of the Cyber-VE traces and the components of criminology theory. Prior to that, an analysis of the exiting profiling process is conducted to identify the process requirements in order to develop the profiling framework. After completing the analysis, an experimental design was setup to generate Cyber-VE traces classification. Traces classification is generated through the process of identifying, extracting and classifying traces. In order to identify the causes that leading to criminal behaviors, two types of criminology theory are used which are social learning theory and space transition theory. A combination of Social Learning Theory and Space Transition Theory was used to explain and identify the criminal behavior in which the criminal behavior will refer to Cyber-VE behavior. Then, both traces classification and criminology theory are integrated in order to develop the profiling framework. The proposed Cyber-VE profiling framework consists of three main processes which are data extraction and classification, Cyber-VE behavior identification, and Cyber-VE profile construction. This profiling framework is evaluated and validated to verify its capabilities in profiling Cyber-VE activities. In the experimental approach, the results from the dataset showed that profiling framework is capable to profile Cyber-VE activities using the proposed profiling framework. In expert view, the results showed that the proposed profiling framework is able to identify the activities that related to Cyber-VE attack. |
format |
Thesis |
qualification_name |
Master of Philosophy (M.Phil.) |
qualification_level |
Master's degree |
author |
Mohd Salleh, Nurhashikin |
author_facet |
Mohd Salleh, Nurhashikin |
author_sort |
Mohd Salleh, Nurhashikin |
title |
A New Profiling Framework In Identifying Cyber Violent Extremism Attack |
title_short |
A New Profiling Framework In Identifying Cyber Violent Extremism Attack |
title_full |
A New Profiling Framework In Identifying Cyber Violent Extremism Attack |
title_fullStr |
A New Profiling Framework In Identifying Cyber Violent Extremism Attack |
title_full_unstemmed |
A New Profiling Framework In Identifying Cyber Violent Extremism Attack |
title_sort |
new profiling framework in identifying cyber violent extremism attack |
granting_institution |
Universiti Teknikal Malaysia Melaka |
granting_department |
Faculty Of Information And Communication Technology |
publishDate |
2018 |
url |
http://eprints.utem.edu.my/id/eprint/23328/1/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf http://eprints.utem.edu.my/id/eprint/23328/2/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf |
_version_ |
1747834035964477440 |
spelling |
my-utem-ep.233282022-02-03T11:29:25Z A New Profiling Framework In Identifying Cyber Violent Extremism Attack 2018 Mohd Salleh, Nurhashikin H Social Sciences (General) HV Social pathology. Social and public welfare Violent extremism has become a serious issue and an area of interest to government as it could leave difficult conditions to the nation. Violent extremism happens when someone chooses to carry out violent method and intent to cause harm to other. These groups of extremists aim to cause as much damage as possible when they intent to create harm to the target. Internet as the medium of communication has led to the formation of cyber communities which attracts violent extremism group. Recently, the violent extremism group uses the Internet as their platform to form online communities and launch their attack, these activities known as Cyber Violent Extremism (Cyber-VE). The ongoing increase in online activities by violent extremist groups along with the lack of mechanisms that can be used to identify violent extremism activity could be considered as a major problem. The threat of Cyber-VE is still on the rise and the existing mechanism do not seem to be reducing this attack. Therefore, the aim of this research is to develop a new profiling framework to help forensic investigators in identifying any activities that related to Cyber-VE attack. This done by integrating the classification of the Cyber-VE traces and the components of criminology theory. Prior to that, an analysis of the exiting profiling process is conducted to identify the process requirements in order to develop the profiling framework. After completing the analysis, an experimental design was setup to generate Cyber-VE traces classification. Traces classification is generated through the process of identifying, extracting and classifying traces. In order to identify the causes that leading to criminal behaviors, two types of criminology theory are used which are social learning theory and space transition theory. A combination of Social Learning Theory and Space Transition Theory was used to explain and identify the criminal behavior in which the criminal behavior will refer to Cyber-VE behavior. Then, both traces classification and criminology theory are integrated in order to develop the profiling framework. The proposed Cyber-VE profiling framework consists of three main processes which are data extraction and classification, Cyber-VE behavior identification, and Cyber-VE profile construction. This profiling framework is evaluated and validated to verify its capabilities in profiling Cyber-VE activities. In the experimental approach, the results from the dataset showed that profiling framework is capable to profile Cyber-VE activities using the proposed profiling framework. In expert view, the results showed that the proposed profiling framework is able to identify the activities that related to Cyber-VE attack. 2018 Thesis http://eprints.utem.edu.my/id/eprint/23328/ http://eprints.utem.edu.my/id/eprint/23328/1/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf text en public http://eprints.utem.edu.my/id/eprint/23328/2/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf text en validuser http://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=112735 mphil masters Universiti Teknikal Malaysia Melaka Faculty Of Information And Communication Technology Selamat, Siti Rahayu 1. Saleh, N.M., Selamat, S.R., Saaya, Z., 2018, August.Profiling Framework in Identifying Cyber Violent Extremism (Cyber-VE) Attack. Journal of Theoretical and Applied Information Technology, 96(16), pp. 5615-5624. 2. Salleh, N.M.,Selamat, S. R., Yusof, R. and Sahib, S., 2016. Discovering Cyber Terrorism using Trace Pattern. International Journal of Network Security, 18(6), pp. 1034-1040. 3. Salleh, N.M., Selamat, S.R., Saaya, Z., Ahmad, R. and Masúd, Z., 2016. Identifying Cyber Violent Extremism (Cyber-VE) Components by Exploring Dark Web. International Journal of Computer Science and Information Security, 14(9), p.52. 4. Salleh, N.M., Selamat, S.R., Saaya, Z., Ahmad, R. and Masúd, Z., 2016, November. A New Taxonomy of Cyber Violent Extremism (Cyber-VE) Attack. 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M),pp. 234-239. |