Reference Hub2
Models for the Detection of Malicious Intent People in Society

Models for the Detection of Malicious Intent People in Society

Preetish Ranjan, Vrijendra Singh, Prabhat Kumar, Satya Prakash
Copyright: © 2018 |Volume: 10 |Issue: 3 |Pages: 12
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522543626|DOI: 10.4018/IJDCF.2018070102
Cite Article Cite Article

MLA

Ranjan, Preetish, et al. "Models for the Detection of Malicious Intent People in Society." IJDCF vol.10, no.3 2018: pp.15-26. http://doi.org/10.4018/IJDCF.2018070102

APA

Ranjan, P., Singh, V., Kumar, P., & Prakash, S. (2018). Models for the Detection of Malicious Intent People in Society. International Journal of Digital Crime and Forensics (IJDCF), 10(3), 15-26. http://doi.org/10.4018/IJDCF.2018070102

Chicago

Ranjan, Preetish, et al. "Models for the Detection of Malicious Intent People in Society," International Journal of Digital Crime and Forensics (IJDCF) 10, no.3: 15-26. http://doi.org/10.4018/IJDCF.2018070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how in less than two decades, internet in mobile phones has grown from a curiosity to an essential element of modern life. Although, this mind-boggling growth has no doubt facilitated international commerce, trade, and travel, it is also being used in the planning and coordination of criminal activities. These types of attacks are often referred to as socio-technical attacks. These attacks are targeted at these sensitive points to society or national security and may have a devastating impact. Often, organized, sponsored, and trained groups are involved to disguise the intelligence system, deployed for the detection of such attacks. Prior detection of such attacks may reduce its impact. In this article, the authors have developed an efficient model to detect malicious node in huge and complex corpus of data associated with call detail record (CDR). This model analyses CDRs to identify covert nodes operating within society for malicious intent.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.