Skip to main content

Hack Investigation and Probing Using BEOS

  • Conference paper
  • First Online:
Accelerating Discoveries in Data Science and Artificial Intelligence II (ICDSAI 2023)

Abstract

Cybercrimes are increasing at a very rapid rate and becoming very heinous on account of the use of growing technological adoption in executing them. The nexus between the criminals and their coordinated network attacks are causing huge damage to the system in very short time. Hence, there is a need for early detection and identification of such offending crime increases. The difficulty in choosing the best strategy, attributing ownership to the collected data for evidence, controlling the device, and authenticating the report generated are issues that need to be addressed because the process of identifying crimes relies on circumstantial evidential data extracted by electrical or physical means. In this paper, a method for detecting deception in suspects and preventing harm through early detection is proposed using a tool called Brain Electrical Oscillations Profiling, which was primarily developed as a forensic tool. Through log monitoring and forensic detection, the actions and methods used during an attack will help create a profile of the perpetrator. Using this knowledge, a new course map for identifying infiltration techniques can be built.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Howard, Analysis of Security Incidents on the Internet (Unpublished Doctoral Dissertation, Carnegie Mellon University, Pennsylvania, 1997)

    Google Scholar 

  2. D. Denning, Information Warfare and Security (Addison-Wesley, Reading, 1998)

    Google Scholar 

  3. J. Littman, The Fugitive Game: Online with Kevinmitnick (Little Brown & Company, Toronto, 1995)

    Google Scholar 

  4. J. Goodell, The Cyber Thief and the Samurai (Dell Publishing, New York, 1996)

    Google Scholar 

  5. N.H. Goodno, Cyberstalking, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Rev. 72, 125–196 (2007)

    Google Scholar 

  6. S. Atkinson, Psychology and the Hacker – Psychological Incident Handling (SANS Institute, 2015) Retrieved from https://www.sans.org/readingroom/whitepapers/incident/psychologyhacker-psychological- incident-handling-36077

    Google Scholar 

  7. C.R. Mukundan, Brain Electrical Oscillation Signature Profiling for Forensic Applications (International Conference of Association of Forensic Sciences, 2005), pp. 21–26

    Google Scholar 

  8. C.S.D. Brown, International Journal of Cyber Criminology (IJCC) 9(1), 55–119 (2015). https://doi.org/10.5281/zenodo.22387

    Article  Google Scholar 

  9. J. Erickson, Hacking: The Art of Exploitation, 2nd edn. (No Starch Press, San Francisco, 2008)

    Google Scholar 

  10. E.L. Deci, The Relation of Interest to the Motivation of Behavior: A Self Determination Theory Perspective (In the Role of Interest in Learning and Development, 1992)

    Google Scholar 

  11. R. Hollinger, Computer hackers follow a guttman-like progression. Social Sci. Rev. 72, 199–200 (1988)

    Google Scholar 

  12. K. Jaco, CSEPS Course Workbook (Jaco Security Publishing, 2004)

    Google Scholar 

  13. C.R. Mukundan, Brain Electrical Oscillations Signature Profiling for Crime Investigation, in Handbook of Forensic Psychology, ed. by V. Veeraraghavan, (Selective & Scientific Books, 2008), pp. 123–146

    Google Scholar 

  14. J. Lusthaus, How organised is organised cybercrime? Global Crime 14(1), 52–60 (2013)

    Article  Google Scholar 

  15. H. Ballin, M.F.H. Ballin, Anticipative Criminal Investigation - Rule of Law Principles for Counterterrorism (T.M.C. Asser Press, The Hague, 2012)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kotari, S., Grandhi, S.R., Ahmad, S., Hijab, M., Taranum, F. (2024). Hack Investigation and Probing Using BEOS. In: Lin, F.M., Patel, A., Kesswani, N., Sambana, B. (eds) Accelerating Discoveries in Data Science and Artificial Intelligence II. ICDSAI 2023. Springer Proceedings in Mathematics & Statistics, vol 438. Springer, Cham. https://doi.org/10.1007/978-3-031-51163-9_34

Download citation

Publish with us

Policies and ethics