Skip to main content

A Software Agent Based Approach for Fraud Detection in Network Crimes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3285))

Abstract

There has been continuous effort by organizations to secure their information resources maintained in computer network infrastructures against security threats arising out of network related frauds. This paper presents a software agent based approach to detect such frauds and provides a means to gather relevant information about the nature of fraud that can be used for forensic analysis. A distributed agent deploy architecture has been presented to observe, gather and record data that can be used in detecting frauds. The applicability of the approach has been demonstrated for a network fraud scenario caused by the Routing Information Protocol (RIP) attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Peterson, D.M.: TCP/IP NETWORKING: A Guide to the IBM Environment, McGRAW International Editions (1995)

    Google Scholar 

  2. Bradshaw, J.M.: An introduction to software agents. In: Bradshaw, J.M. (ed.) Software Agents, pp. 3–46. AAA1 Press/MIT Press, Cambridge (1997)

    Google Scholar 

  3. Jayasingh, B.B., Patra, M.R., Sastry, P.K.: An Agent based Architecture for Cyber Forensics. In: Proceedings of the5th International Conference on Information Technology (CIT 2002), Bhubaneswar, India, December 21-24, pp. 311–314 (2002)

    Google Scholar 

  4. Farmer, W.M., Guttman, J.D., Swarup, V.: Security for mobile agents: issues and Requirements. In: Proceedings of the 19th National Information Systems Security Conference, October 1996. National Institute of Standards and Technology, vol. 2 (1996)

    Google Scholar 

  5. Kyas, O.: Internet Security: Risk Analysis, Strategies and Firewalls, International Thomson Computer Press, Copyright (1997)

    Google Scholar 

  6. Hack Attacks REAVEALED, A Complete Reference with custom security hacking toolkit, Wiley computer publishing, USA (2001)

    Google Scholar 

  7. Poulsen, K.L.: Hack Proofing your network: Internet Tradecraft. Syngress publishing, inc., USA (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Patra, M.R., Jayasingh, B.B. (2004). A Software Agent Based Approach for Fraud Detection in Network Crimes. In: Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds) Applied Computing. AACC 2004. Lecture Notes in Computer Science, vol 3285. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30176-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30176-9_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23659-7

  • Online ISBN: 978-3-540-30176-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics