Skip to main content

Network Threat Analysis

Part of the Internet of Things book series (ITTCC)

Abstract

This chapter will share some key results from the SAINT project starting with an overview of the people who form the cybercrime network including attackers, victims and the organisations who are attempting to protect them. Then we will elaborate on the role of information from the point of view of various relevant stakeholders (cybercriminals, potential cybercrime victims, cyber-defence services providers, cybersecurity regulatory and law enforcement authorities, researchers). Finally, we will discuss the future of cybersecurity in the context of IoT and present both the underlying opportunities and threats.

Keywords

  • Cybercrime
  • Network
  • Threat
  • Stakeholder management
  • Cybersecurity
  • IoT

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   179.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68). Palgrave Macmillan, London.

  2. 2.

    Marion, N. E. (2010). The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation. International Journal of Cyber Criminology, 4(1/2), 699.

  3. 3.

    Näsi, M., Oksanen, A., Keipi, T., & Räsänen, P. (2015). Cybercrime victimisation among young people: a multi-nation study. Journal of Scandinavian Studies in Criminology and Crime. Prevention, 16(2), 203-210.

  4. 4.

    Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2010). Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilisation. Journal of Adolescent Health, 47(2), 183-190.

  5. 5.

    Acar, K. V. (2016). Sexual Extortion of Children in Cyberspace. International Journal of Cyber Criminology, 10(2), 110.

  6. 6.

    Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth.

  7. 7.

    http://www.belfasttelegraph.co.uk/news/northern-ireland/hundreds-of-kids-cyber-crime-victims-and-its-tip-of-iceberg-psni-has-warned-30267519.html

  8. 8.

    Koops, B. J. (2010). The internet and its opportunities for cybercrime.

  9. 9.

    Ross, S., & Smith, R. G. (2011). Risk factors for advance fee fraud victimisation. Trends and Issues in Crime and Criminal Justice, (420), 1.

  10. 10.

    Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., & Wang, L. (2010, August). On the analysis of the zeus botnet crimeware toolkit. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on (pp. 31-38). IEEE.

  11. 11.

    O’Gorman, G., & McDonald, G. (2012). Ransomware: A growing menace. Symantec Corporation.

  12. 12.

    Hutchings, A., & Holt, T. J. (2014). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.

  13. 13.

    Kokkinos, C. M., Antoniadou, N., & Markos, A. (2014). Cyber-bullying: An investigation of the psychological profile of university student participants. Journal of Applied Developmental Psychology, 35(3), 204-214.

  14. 14.

    Citron, D. K., & Franks, M. A. (2014). Criminalizing revenge porn

  15. 15.

    Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.

  16. 16.

    Hyman, P. (2013). Cybercrime: it’s serious, but exactly how serious?. Communications of the ACM, 56(3), 18-20.

  17. 17.

    Walters, R. (2014). Cyber attacks on US companies in 2014. The Heritage Foundation, 4289, 1-5.

  18. 18.

    Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials.

  19. 19.

    Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Oxford University Press, USA.

References

  1. Council of Europe, Cyberterrorism: the use of the internet for terrorist purposes. United Nations Office on Drugs and Crime 12(1), 497 (2007)

    Google Scholar 

  2. T. Sorell, Human rights and hacktivism: the cases of Wikileaks and anonymous. J. Human Rights Pract. 7(3), 391–410 (2015)

    CrossRef  Google Scholar 

  3. M.K. Rogers, The psyche of cybercriminals: a psycho-Social perspective’, in Cybercrimes: a multidisciplinary analysis (Springer, Berlin, 2011), pp. 217–235

    CrossRef  Google Scholar 

  4. C. Dianne Martin, Taking the high road: white hat, black hat: the ethics of cybersecurity. ACM Inroads 8(1), 33–36 (2017)

    CrossRef  Google Scholar 

  5. R. Sabillon et al., Cybercrime and cybercriminals: a comprehensive study. Int. J. Comput. Netw. Commun. Secur. 4(6), 165–176 (2016). http://www.ijcncs.org/published/volume4/issue6/p1_4-6.pdf

    Google Scholar 

  6. N. Rasmussen, Homeland Security and Governmental Affairs “Cyber security, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland” Framing the Threat’ (2014), pp. 1–4.

    Google Scholar 

  7. R. Richardson, 2010/2011 computer crime and security survey. Director 2011, 1–40 (2011). https://doi.org/10.1108/09685229810209414

    CrossRef  Google Scholar 

Download references

Acknowledgments

This chapter includes results shared by the European research project SAINT (Grant Agreement N° 740829), which has received funding from the European Union’s Horizon 2020 Research and Innovation Programme and the Swiss State Secretariat for Education, Research and Innovation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Brékine .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Brékine, A. et al. (2019). Network Threat Analysis. In: Ziegler, S. (eds) Internet of Things Security and Data Protection. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-04984-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04984-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04983-6

  • Online ISBN: 978-3-030-04984-3

  • eBook Packages: EngineeringEngineering (R0)