Skip to main content

Internet Usage Monitoring for Crime Detection

  • Conference paper
Information Processing and Management (BAIP 2010)

Abstract

Though Internet has huge contribution to Society’s development; In recent time Internet has been used by Criminals, Terrorists, and Hackers for mal-activities. Open environments for Internet access such as publicly used Internet café’s and university/school laboratories are becoming a platform for Criminals and newbie Crackers. The major reason behind this is lack of proper authentication, insufficient logging & usage monitoring system in these environments. We propose Internet Usage Monitoring for Crime Detection (IUMCD) system for detection and prevention of criminal activities and intrusion attempts happening from such open environments. The IUMCD is a proactive system which monitors all User activities when User is accessing Internet from an open environment. We observed that IUMCD system is able to detect and report many different types of Criminal activities and Intrusion attempts while maintaining User’s private information inaccessible to others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Qi, F., Tang, Z., Wang, G.: Attacks vs. Countermeasures of SSL Protected Trust Model. In: ICYCS 2008, pp. 1986–1991 (2008)

    Google Scholar 

  2. Markendahl, J.: Analysis of Customer Relations For Public Internet Access in The Local Environment. Special Session paper The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2007 (2007)

    Google Scholar 

  3. Navajas, J.F., Viruete Navarro, E.A., Ruiz, I.M.: On-line Internet Access Estimation Tool: EQoSIM. In: EUROCON 2005, pp. 1163–1166 (2005)

    Google Scholar 

  4. Doja, M.N., Kumar, N.: Image Authentication Schemes against Key-Logger Spyware. In: SNPD 2008, pp. 574–579 (2008)

    Google Scholar 

  5. Do, T.D., Hui, S.C.: Web Mining for Cyber Monitoring and Filtering. In: Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, December 1-3, pp. 399–404 (2004)

    Google Scholar 

  6. Deri, L., Suin, S.: Practical network security: experiences with ntop. Computer Networks 34(6), 873–880 (2000)

    Article  Google Scholar 

  7. Chan, W.C.: Globalization of Internet Access. In: Proceedings of The IEEE International Conference on Industrial Technology, pp. 485–488 (1996)

    Google Scholar 

  8. Lizcano, P.J., Azcorra, A., Solé-Pareta, J., Domingo-Pascual, J., Alvarez-Campana, M.: MEHARI: a system for analyzing the use of the internet services. Computer Networks 31(21), 2293–2307 (1999)

    Article  Google Scholar 

  9. Appenzeller, G., Roussopoulos, M., Baker, M.: User-Friendly Access Control for Public Network Ports. In: INFOCOM 1999, pp. 699–707 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thorat, S.A., Manore, S.R. (2010). Internet Usage Monitoring for Crime Detection. In: Das, V.V., et al. Information Processing and Management. BAIP 2010. Communications in Computer and Information Science, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12214-9_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12214-9_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12213-2

  • Online ISBN: 978-3-642-12214-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics