Professional Documents
Culture Documents
Pani TerrorThreat Ch14
Pani TerrorThreat Ch14
net/publication/346610942
CITATIONS READS
0 10
2 authors, including:
SEE PROFILE
All content following this page was uploaded by Chandra Sekhar Biswal on 13 December 2020.
Abstract
In the recent years, Internet has very quickly changed in range of fields starting
from education, start-ups, and sports to entertainment medium, everywhere
use of internet become frequent. So internet is the knowledge hub for each and
every person having little knowledge about operating the web browser or mobile
devices. The use of internet also contains both advantages and disadvantages.
The worst disadvantage of internet is Cyber-Crime. Now-a-days Cyber-crime is
an emerging threat to all the internet and computer users as well as society in
general. Therefore, various countries government, police departments and other
intelligence departments are now being strict and reactionary to these emerging
cyber threats and spreading of cyber-crimes. Governments have started taking
initiatives to eliminate cyber-crimes of all kinds along with cross- border cyber
threats, dark web operations etc. Governments of every country including India
have started setting up cyber cells across the country and also making them func-
tional by educating police personnel regarding the prevention of cyber-crime. The
prime focus of our paper is to give emphasis on various frauds and cybercrime
happenings in India as well as different types of cyber-crimes along with possible
probable solutions.
Subhendu Kumar Pani, Sanjay Kumar Singh, Lalit Garg, Ram Bilas Pachori and Xiaobo Zhang (eds.)
Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques
and Applications, (291–312) © 2021 Scrivener Publishing LLC
291
292 Intelligent Data Analytics for Terror Threat Prediction
14.1 Introduction
In India we can define cybercrime as an unlawful act or a crime where a
computer, mobile devices or any IT enabled devices can be used as a tool
or a target. In detail it is an unauthorized access to anybody’s computer,
mobile device or personal accounts on social media, bank accounts or a
personalized cloud space is a cybercrime. An intuition to access business
data from Various Data store over the cloud, website and email ids are also
coming under cybercrime. The person or organization that performs this
kind of activity is known as hacker (Black hat hacker). Cybercrime is a
reasonably new alarm for law enforcement department as large numbers
of computer owners are connected to Internet; cybercrime also increases
accordingly [1]. So to clearly understand about the cybercrime, one has
to learn the language and culture of the internet along with the pathways
which facilitates various users around the world to connect among them.
To prevent cybercrime you need to know all the mechanisms and meth-
odology used for performing cyber-attack. The professionals who prevent
cybercrimes are known as White hat hackers [2].
Due to rapid technological changes, our life becomes more. Be it busi-
ness, education, shopping or banking transactions, almost everything is
on the cyber space today. The attention being given to cyber security is
often focused on trying to define the problem and assess the true threat
level. Cyber security plays an important role in the development of infor-
mation technology as well as Internet services. Cybercrime is evolving at
an astounding pace, following the same dynamics as the inevitable pene-
tration of computer technology and communication into all walks of life.
One of the serious issues in Information Technology is Data Protection
or information security which thrusts a major challenge. Of course Internet
has become one of the most important and fast growing medium for busi-
ness development in both private and government sectors. It is being used
as the largest communication and information exchange medium now. At
the same time Internet is becoming an instrument of numerous types of
cybercrimes. It is being used to steal and manipulate the information of
users. Important data is being stolen and personal as well as organizational
threats are being imposed upon the users which are using Internet.
Not only that now-a-days, Internet is prominently used as one of the
prevalent communication and information exchange media. Contrastingly,
it becomes an easy way for various ways of cybercrimes such as stealing
and manipulating the private information of users. The chances of stealing
an Internet user’s important information and data become more often be it
Cyber-Crime Prevention Methodology 293
➢ Internet
When a network connection is done among a large set of
computers around the world, it is known as internetworking
or simply Internet. Basically internet is used for sending and
receiving email, webpage accessing, transferring files, chat,
and a lot of other purposes.
➢ Web Browser
It provides the facility to access information through World
Wide Web server. Here a url i.e. the address of a particular
web server is used to access any information resource. Some
of the commonly used web browsers are Google Chrome,
Mozilla Firefox, Internet Explorer, Safari [5].
➢ Internet Service Provider (ISP)
This medium provides access to users for various require-
ments [6].
➢ IP Address
It stands for Internet Protocol where a numerical label is
assigned to a particular device that is participating in a com-
puter network which provides a unique identification for the
particular machine. For example, 172.17.64.150 [7].
294 Intelligent Data Analytics for Terror Threat Prediction
➢ Email Spoofing
Here a hacker can access your email ID in an authorized way.
So email spoofing is a process through which an intruder
uses the email id of a user for harmful purposes.
➢ Computer Virus
It’s a mischievous computer program which can be executed
and replicated by itself same as a biological virus does. It can
modify or damage or take control of the other computer
programs.
➢ Computer Worm
It is one type of computer virus, which can capable of
self-replication and spread to other computers over internet
or by using any other transmission medium. It differs from
virus in a way which doesn’t require itself to be attached to
an existing program as well as viruses work on the target
computer only [8].
➢ Spyware
Basically this software is maliciously installed on a user’s
computer without his knowledge to procure unauthorized
user’s information e.g., Keyloggers.
➢ Adware
Adware is a type of malware, which is basically injected to
user’s computer by using any non-trusted/malicious web-
sites. The Adware also have self-replication capacity and
their objective is to server various non-legitimate and ille-
gal Ads to users, without having the user’s consent. Mainly
Adware attacks web browsers.
➢ Ransomware
It is also the form of malware, which get injected to user’s
computer from several sources over the internet. Once the
ransomware gets injected to any user’s computer, it will
encrypt all the user data present in that computer. The hack-
ers, who have injected the ransomware, ask for some ran-
som amount for giving the decryption key to decrypt the
encrypted files.
Identity Theft,
Phishing
• General Public
• Business houses
• Financial Institutions
• IT companies
Identity Theft
Identity theft is alternatively known as identity fraud; this is
a wrongful act of obtaining someone’s personal information,
which defined their identity. These personal information might
be any person’s Name, Photograph, Phone Number, Bank
account number, Credit/Debit card number, Tax Information
(PAN), Driving License, Aadhar card number, etc.
Identity theft has many negative impacts such as:
✓ Open Social Media account, Email account on your name.
✓ Criminal can obtained access to your bank account.
✓ Create fake utility account.
✓ Can tell your name during a police arrest.
✓ Obtain Duplicate SIM card
✓ Fake Identity card, Immigration papers creation.
Due to all these reasons Identity thefts are a severe cybercrime these
days, making us elaborate in details about identity theft in details.
Cyber-Crime Prevention Methodology 297
Prevention Tips
are alternatively known as honey trap cyber frauds. Initially these hack-
ers communicate with potential vulnerable users over concerned websites
chat room, later they communicate over telephone call and WhatsApp.
Sometimes these hackers also harass victims mentally and sexually. These
are cyber frauds but not financial frauds.
There are several examples of matrimonial frauds known as Black Dollar
fraud. In this context, hacker pretends to be from abroad and request the
victim to accept some gift (Black Dollar) presented over pre-paid courier,
i.e. the victim has to pay certain amount to the courier boy and then he
will be given the box containing black dollar. The dollar (Fake dollar) was
coated in a black-like material and that has to clean using some chemical.
After cleaning the black dollar, we can see the dollar and that dollar is fake
dollar.
Prevention Tips
Prevention Tips
(Victim) (Server)
In MITM attack, hackers basically use the public Wi-Fi most of the time,
as the information transmitted using public Wi-Fi are generally unen-
crypted. A compromised Router can take away all the personal data from
your computer or mobile devices. For an instance, if you are opening your
email using a vulnerable Wi-Fi, then the hacker can easily get the user ID
and Password.
In many cases, hackers run fake Wi-Fi signals in public places only to
hack people’s mobile phone or computers.
Prevention Tips
14.3.1 Phishing
Phishing is a popular cybercrime, which is the act of creating fraudulent
websites, sending fraudulent emails, text messages that appear to be from
a legitimate source. Using phishing the hackers try to obtain various sen-
sitive information from victim such as Online banking user name and
passwords, Email ID and passwords and other such details by disguising
oneself as a trusted entity over electronic communication.
Cyber-Crime Prevention Methodology 301
Save Legitimate modify the Attach the Script Zip the modified
Site copied website to login page files
As per the above figure (Figure 14.3) the hackers first make a plan for
phishing and make a replication of any legitimate website such as Leading
Social media website or Popular Online banking website and host he rep-
lication website in any webserver and assign a similar domain name to it
e.g., Facebook.com is Facelook.com, onlinesbi.com as sbionline.net, gmail.
com as Hmail.com. While making similar web design (replication) of any
legitimate website hackers generally use very similar logo and exact same
to same color combination of the legitimate site so that the victim will
not able to identify whether it’s the real website or phishing website easily.
There must be some login and register page in the phishing page, which is
also so similar to the original one.
Then scammers run several email campaigns to populate the phishing
websites around the vulnerable users. When any user finds the phishing site
either from email campaign or any other medium and enters the Username
and Password, the username and passwords will be stored at the database
that is being deployed by the hacker to store the victim’s details. In this way
the hacker will get the direct access of many users’ bank account and social
media account, etc.
Prevention Tips
14.3.2 Vishing/Smishing
Vishing is also a cyber-crime, which is very similar to the phishing concept.
In the case of Vishing, the hacker/spammers generally call to potentially
vulnerable victims and pretend that they are calling from any legitimate
organization. Here fraudster collects sensitive user information over phone.
Cyber-Crime Prevention Methodology 303
Smishing refers to the same type of crime like phishing and vishing but
the only difference here is spammers use SMS instead of Email or tele-
phone for acquiring sensitive user data.
Victim Server
Login: user1, password: 1234
23
9 CC
A 20
EB
299
: F7
ID
on
ssi
Se
Attacker
14.3.5 IP Spoofing
Spoofing means to pretend as someone else. IP spoofing is a technique used
for gaining anonymous access to the victim’s computer with an IP address
of any trusted host. While implementing IP spoofing technique, attacker
obtains the IP address of the client and injects their own spoofed packet
along with the client IP over the TCP session. So the server will be fooled and
it will treat this like communicating with the original host, i.e. the victim.
There are several tools such as: mitmproxy, Wireshark, sslstrip that these
hackers use on Kali linux for IP Spoofing.
Cyber-Crime Prevention Methodology 305
Prevention
5. Now the attacker can extract the victim’s cookie as and when
the http request reached the server.
6. Attacker can use the stolen cookie for many anonymous
activities.
Prevention
• Sanitize all the user inputs while taking input using any web
form.
• Perform regular security audit of the web application and
look for malicious code inside it.
• Never execute any user’s input without verifying its type.
• Encode data on output.
• Use content security policy.
As shown in Figure 14.8, the SQL injection statement executer will get
the same output from the Database as an authenticated user will get, while
entering the correct username and password.
There are many types of SQL injection such as in-band SQLi, Out-of-
band, and Blind SQLi. The SQL injection attack is not.
BOTNET OF
HUNDREDS,
THOUSANDS OF
INFECTED HOSTS
In Figure 14.9:
Prevention
Wikipedia Facebook
Google Amazon
NYtimes SURFACE WEB
Bing Twitter TImes of India
Yahoo
DEEP WEB
Private Communications,
Onion Sites, Drug Trafficking DARK WEB
can get the most appropriate search result for their desired search query.
Search engine employs some automated crawlers and spiders for indexing
various resources all over the internet. But in case of Deep web the techni-
cal architectures are much complicated that a search engine can never find
the data and web resources stored on deep web for indexing [12].
Lots of data on online isn’t available for public access. Companies or
banks have private databases, or some websites, which are not meant
to be indexed on search engines and they are remain unsearchable. The
deep web is a rich repository of confidential information such as medi-
cal Records, Financial Information, Legal Documents, Scientific research
details, Government records, etc. [13].
14.7 Conclusion
It is evident from the past studies and records that when the technology
advances at the same time cybercrimes also increases. It is a surprising fact
that cybercrimes are performed more by the qualified people so it propels
all to know about the basic principles and ethics of internet use. Definitely
cybercrimes and hacking are posing a big threat for safe internet use. We
can utilize the various techniques and occurrences from past incidents so
that cybercrime can be reduced comparatively. Also stringent Cyber laws
are required to change and evolve as swiftly as hackers do for effective way
of controlling cybercrime. So, there should be balance between protecting
citizens from crime, and providing their rights intact. The prime advan-
tage of internet is its vastness and free use. But again the question arises
whether it can provide stiff action against cyber criminals. It is seen that as
security becomes steep, intruders also advance in their path accordingly.
There will be a lot of unexpected difficult challenges which will stay ahead
of cyber criminals and cyber terrorists that can be prevented with a close
and positive partnership and collaboration of both the individuals and
government. Our aim is to focus upon a safe, secure and trustworthy com-
puting environment for all. Definitely it is very vital for maintaining our
national security and economy. Although various steps are taken by the
Indian Govt. for decreasing cybercrimes and safe internet use, yet cyber
law cannot afford to be static. It should be strictly changed keeping in pace
with the advancement of technology and time.
312 Intelligent Data Analytics for Terror Threat Prediction
References
1. Neufeld, D., Understanding Cybercrime. Conference: 43rd Hawaii
International Conference on Systems Science (HICSS-43 2010), Proceedings,
Koloa, Kauai, HI, USA, 5–8 January 2010.
2. Ndubueze, P.N., Cyber Criminology: Contexts, Concerns and Directions,
Ahmadu Bello University Press, Kaduna State, Nigeria, July 2018.
3. Ghate, S. and Agrawal, P.K., A Literature Review on Cyber Security in Indian
Context. J. Comput. Inf. Technol., 8, 5, 30−36, 20th October, 2017.
4. Cagnin, C., Havas, A., Saritas, O., Future-oriented technology analysis: Its
potential to address disruptive transformations. Technol. Forecasting Social
Change, 80, 3, 379–385, March 2013.
5. J. Dubovský, Google Patent, Jul. 14, 2016, Pub. No.: US 2016/0203337 A1.
6. https://en.wikipedia.org/wiki/Internet_service_provider.
7. Gunjan, V.K., Kumar, A., Avdhanam, S., A Survey of Cyber Crime in India.
Conference: ICACT 2013At: Rajampet, Andhra Pradesh, India, September
2013.
8. https://blog.malwarebytes.com/threats/worm/.
9. Maraza, B., Revista Internacional de Ingeniería y Tecnología (EAU), Published
on Dubai, Bremen, Science Publishing Corporation, Jul 29, 2018.
10. Syed, N.F., IoT-MQTT based denial of service attack modelling and detection,
Edith Cowan University, Australia, 2020, https://ro.ecu.edu.au/theses/2303.
11. https://www.youtube.com/watch?v=z5W-tIIK8Ts.
12. Merelli, I., Pérez-Sánchez, H., Gesing, S., D’Agostino, D., Managing,
Analysing, and Integrating Big Data in Medical Bioinformatics: Open
Problems and Future Perspectives, in: High-Performance Computing and Big
Data in Omics-based Medicine, vol. 2014, Article ID 134023,01 Sep 2014.
13. Dark Web. Bloomenthal, Andrew, Reviewed By Anderson, Somer, Updated
Jul 7, https://www.investopedia.com/terms/d/dark-web.asp.
14. https://en.wikipedia.org/wiki/Darknet#:~:text=A%20dark%20net%20
or%20darknet,a%20unique%20customised%20communication%20
protocol.
15. https://www.techrepublic.com/article/dark-web-the-smart-persons-guide/.