A New Profiling Framework In Identifying Cyber Violent Extremism Attack

Violent extremism has become a serious issue and an area of interest to government as it could leave difficult conditions to the nation. Violent extremism happens when someone chooses to carry out violent method and intent to cause harm to other. These groups of extremists aim to cause as much damag...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd Salleh, Nurhashikin
Format: Thesis
Language:English
English
Published: 2018
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/23328/1/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf
http://eprints.utem.edu.my/id/eprint/23328/2/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.23328
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Selamat, Siti Rahayu

topic H Social Sciences (General)
H Social Sciences (General)
spellingShingle H Social Sciences (General)
H Social Sciences (General)
Mohd Salleh, Nurhashikin
A New Profiling Framework In Identifying Cyber Violent Extremism Attack
description Violent extremism has become a serious issue and an area of interest to government as it could leave difficult conditions to the nation. Violent extremism happens when someone chooses to carry out violent method and intent to cause harm to other. These groups of extremists aim to cause as much damage as possible when they intent to create harm to the target. Internet as the medium of communication has led to the formation of cyber communities which attracts violent extremism group. Recently, the violent extremism group uses the Internet as their platform to form online communities and launch their attack, these activities known as Cyber Violent Extremism (Cyber-VE). The ongoing increase in online activities by violent extremist groups along with the lack of mechanisms that can be used to identify violent extremism activity could be considered as a major problem. The threat of Cyber-VE is still on the rise and the existing mechanism do not seem to be reducing this attack. Therefore, the aim of this research is to develop a new profiling framework to help forensic investigators in identifying any activities that related to Cyber-VE attack. This done by integrating the classification of the Cyber-VE traces and the components of criminology theory. Prior to that, an analysis of the exiting profiling process is conducted to identify the process requirements in order to develop the profiling framework. After completing the analysis, an experimental design was setup to generate Cyber-VE traces classification. Traces classification is generated through the process of identifying, extracting and classifying traces. In order to identify the causes that leading to criminal behaviors, two types of criminology theory are used which are social learning theory and space transition theory. A combination of Social Learning Theory and Space Transition Theory was used to explain and identify the criminal behavior in which the criminal behavior will refer to Cyber-VE behavior. Then, both traces classification and criminology theory are integrated in order to develop the profiling framework. The proposed Cyber-VE profiling framework consists of three main processes which are data extraction and classification, Cyber-VE behavior identification, and Cyber-VE profile construction. This profiling framework is evaluated and validated to verify its capabilities in profiling Cyber-VE activities. In the experimental approach, the results from the dataset showed that profiling framework is capable to profile Cyber-VE activities using the proposed profiling framework. In expert view, the results showed that the proposed profiling framework is able to identify the activities that related to Cyber-VE attack.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Mohd Salleh, Nurhashikin
author_facet Mohd Salleh, Nurhashikin
author_sort Mohd Salleh, Nurhashikin
title A New Profiling Framework In Identifying Cyber Violent Extremism Attack
title_short A New Profiling Framework In Identifying Cyber Violent Extremism Attack
title_full A New Profiling Framework In Identifying Cyber Violent Extremism Attack
title_fullStr A New Profiling Framework In Identifying Cyber Violent Extremism Attack
title_full_unstemmed A New Profiling Framework In Identifying Cyber Violent Extremism Attack
title_sort new profiling framework in identifying cyber violent extremism attack
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty Of Information And Communication Technology
publishDate 2018
url http://eprints.utem.edu.my/id/eprint/23328/1/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf
http://eprints.utem.edu.my/id/eprint/23328/2/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf
_version_ 1747834035964477440
spelling my-utem-ep.233282022-02-03T11:29:25Z A New Profiling Framework In Identifying Cyber Violent Extremism Attack 2018 Mohd Salleh, Nurhashikin H Social Sciences (General) HV Social pathology. Social and public welfare Violent extremism has become a serious issue and an area of interest to government as it could leave difficult conditions to the nation. Violent extremism happens when someone chooses to carry out violent method and intent to cause harm to other. These groups of extremists aim to cause as much damage as possible when they intent to create harm to the target. Internet as the medium of communication has led to the formation of cyber communities which attracts violent extremism group. Recently, the violent extremism group uses the Internet as their platform to form online communities and launch their attack, these activities known as Cyber Violent Extremism (Cyber-VE). The ongoing increase in online activities by violent extremist groups along with the lack of mechanisms that can be used to identify violent extremism activity could be considered as a major problem. The threat of Cyber-VE is still on the rise and the existing mechanism do not seem to be reducing this attack. Therefore, the aim of this research is to develop a new profiling framework to help forensic investigators in identifying any activities that related to Cyber-VE attack. This done by integrating the classification of the Cyber-VE traces and the components of criminology theory. Prior to that, an analysis of the exiting profiling process is conducted to identify the process requirements in order to develop the profiling framework. After completing the analysis, an experimental design was setup to generate Cyber-VE traces classification. Traces classification is generated through the process of identifying, extracting and classifying traces. In order to identify the causes that leading to criminal behaviors, two types of criminology theory are used which are social learning theory and space transition theory. A combination of Social Learning Theory and Space Transition Theory was used to explain and identify the criminal behavior in which the criminal behavior will refer to Cyber-VE behavior. Then, both traces classification and criminology theory are integrated in order to develop the profiling framework. The proposed Cyber-VE profiling framework consists of three main processes which are data extraction and classification, Cyber-VE behavior identification, and Cyber-VE profile construction. This profiling framework is evaluated and validated to verify its capabilities in profiling Cyber-VE activities. In the experimental approach, the results from the dataset showed that profiling framework is capable to profile Cyber-VE activities using the proposed profiling framework. In expert view, the results showed that the proposed profiling framework is able to identify the activities that related to Cyber-VE attack. 2018 Thesis http://eprints.utem.edu.my/id/eprint/23328/ http://eprints.utem.edu.my/id/eprint/23328/1/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf text en public http://eprints.utem.edu.my/id/eprint/23328/2/A%20New%20Profiling%20Framework%20In%20Identifying%20Cyber%20Violent%20Extremism%20Attack.pdf text en validuser http://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=112735 mphil masters Universiti Teknikal Malaysia Melaka Faculty Of Information And Communication Technology Selamat, Siti Rahayu 1. Saleh, N.M., Selamat, S.R., Saaya, Z., 2018, August.Profiling Framework in Identifying Cyber Violent Extremism (Cyber-VE) Attack. Journal of Theoretical and Applied Information Technology, 96(16), pp. 5615-5624. 2. Salleh, N.M.,Selamat, S. R., Yusof, R. and Sahib, S., 2016. Discovering Cyber Terrorism using Trace Pattern. International Journal of Network Security, 18(6), pp. 1034-1040. 3. Salleh, N.M., Selamat, S.R., Saaya, Z., Ahmad, R. and Masúd, Z., 2016. Identifying Cyber Violent Extremism (Cyber-VE) Components by Exploring Dark Web. International Journal of Computer Science and Information Security, 14(9), p.52. 4. Salleh, N.M., Selamat, S.R., Saaya, Z., Ahmad, R. and Masúd, Z., 2016, November. A New Taxonomy of Cyber Violent Extremism (Cyber-VE) Attack. 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M),pp. 234-239.