Abstract
Cybercrimes are increasing at a very rapid rate and becoming very heinous on account of the use of growing technological adoption in executing them. The nexus between the criminals and their coordinated network attacks are causing huge damage to the system in very short time. Hence, there is a need for early detection and identification of such offending crime increases. The difficulty in choosing the best strategy, attributing ownership to the collected data for evidence, controlling the device, and authenticating the report generated are issues that need to be addressed because the process of identifying crimes relies on circumstantial evidential data extracted by electrical or physical means. In this paper, a method for detecting deception in suspects and preventing harm through early detection is proposed using a tool called Brain Electrical Oscillations Profiling, which was primarily developed as a forensic tool. Through log monitoring and forensic detection, the actions and methods used during an attack will help create a profile of the perpetrator. Using this knowledge, a new course map for identifying infiltration techniques can be built.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Howard, Analysis of Security Incidents on the Internet (Unpublished Doctoral Dissertation, Carnegie Mellon University, Pennsylvania, 1997)
D. Denning, Information Warfare and Security (Addison-Wesley, Reading, 1998)
J. Littman, The Fugitive Game: Online with Kevinmitnick (Little Brown & Company, Toronto, 1995)
J. Goodell, The Cyber Thief and the Samurai (Dell Publishing, New York, 1996)
N.H. Goodno, Cyberstalking, a new crime: Evaluating the effectiveness of current state and federal laws. Missouri Law Rev. 72, 125–196 (2007)
S. Atkinson, Psychology and the Hacker – Psychological Incident Handling (SANS Institute, 2015) Retrieved from https://www.sans.org/readingroom/whitepapers/incident/psychologyhacker-psychological- incident-handling-36077
C.R. Mukundan, Brain Electrical Oscillation Signature Profiling for Forensic Applications (International Conference of Association of Forensic Sciences, 2005), pp. 21–26
C.S.D. Brown, International Journal of Cyber Criminology (IJCC) 9(1), 55–119 (2015). https://doi.org/10.5281/zenodo.22387
J. Erickson, Hacking: The Art of Exploitation, 2nd edn. (No Starch Press, San Francisco, 2008)
E.L. Deci, The Relation of Interest to the Motivation of Behavior: A Self Determination Theory Perspective (In the Role of Interest in Learning and Development, 1992)
R. Hollinger, Computer hackers follow a guttman-like progression. Social Sci. Rev. 72, 199–200 (1988)
K. Jaco, CSEPS Course Workbook (Jaco Security Publishing, 2004)
C.R. Mukundan, Brain Electrical Oscillations Signature Profiling for Crime Investigation, in Handbook of Forensic Psychology, ed. by V. Veeraraghavan, (Selective & Scientific Books, 2008), pp. 123–146
J. Lusthaus, How organised is organised cybercrime? Global Crime 14(1), 52–60 (2013)
H. Ballin, M.F.H. Ballin, Anticipative Criminal Investigation - Rule of Law Principles for Counterterrorism (T.M.C. Asser Press, The Hague, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kotari, S., Grandhi, S.R., Ahmad, S., Hijab, M., Taranum, F. (2024). Hack Investigation and Probing Using BEOS. In: Lin, F.M., Patel, A., Kesswani, N., Sambana, B. (eds) Accelerating Discoveries in Data Science and Artificial Intelligence II. ICDSAI 2023. Springer Proceedings in Mathematics & Statistics, vol 438. Springer, Cham. https://doi.org/10.1007/978-3-031-51163-9_34
Download citation
DOI: https://doi.org/10.1007/978-3-031-51163-9_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-51162-2
Online ISBN: 978-3-031-51163-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)