Internet Usage Monitoring for Crime Detection

Though Internet has huge contribution to Society’s development; In recent time Internet has been used by Criminals, Terrorists, and Hackers for mal-activities. Open environments for Internet access such as publicly used Internet cafe’s and university/school laboratories are becoming a platform for Criminals and newbie Crackers. The major reason behind this is lack of proper authentication, insufficient logging & usage monitoring system in these environments. We propose Internet Usage Monitoring for Crime Detection (IUMCD) system for detection and prevention of criminal activities and intrusion attempts happening from such open environments. The IUMCD is a proactive system which monitors all User activities when User is accessing Internet from an open environment. We observed that IUMCD system is able to detect and report many different types of Criminal activities and Intrusion attempts while maintaining User’s private information inaccessible to others.

[1]  Guido Appenzeller,et al.  User-friendly access control for public network ports , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[2]  Jan Markendahl Analysis of Customer Relations for Public Internet Access in the Local Environment , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  S.C. Hui,et al.  Web mining for cyber monitoring and filtering , 2004, IEEE Conference on Cybernetics and Intelligent Systems, 2004..

[4]  Jordi Domingo-Pascual,et al.  MEHARI: a system for analysing the use of the internet services , 1999, Comput. Networks.

[5]  Luca Deri,et al.  Practical network security: experiences with ntop , 2000, Comput. Networks.

[6]  W. C. Chan Globalization of Internet access , 1996, Proceedings of the IEEE International Conference on Industrial Technology (ICIT'96).

[7]  Guojun Wang,et al.  Attacks vs. Countermeasures of SSL Protected Trust Model , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[8]  M. N. Doja,et al.  Image Authentication Schemes against Key-Logger Spyware , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[9]  J.F. Navajas,et al.  On-line Internet Access Estimation Tool: EQoSIM , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".