Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.4.115

Profiling of Cyber-crime by Psychological View  

Lim, Chae-Ho (NHN Corporation)
Kim, Jee-Young (NBP Corporation)
Choi, Jin-Hyuk (Korea Corporate Security Managers' Council)
Abstract
Internet is in rapid growth from technology to total social environment, so technical and syntax based cyber crime is evolved but also psychological and semantic based one is showing. In this paper, we analyze the cyber-crime cases announced by police, then classify it into social and technical influence. After that, we study the profiling method on psychological view point of cyber-crimes. We expect that it is possible to classify cyber-crimes into the categories rapidly and take less time to analyze and response.
Keywords
Cyber-crime; Social engineering; Psychological view;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KISA, '2006 정보시스템 해킹.바이러스 현황 및 대응,' pp. 5-6, 2006년 12월
2 ZDNet Korea, '해킹의 프로화 (명예보다 돈이 좋아),' http:;/www.zdnet.co.kr/ArticleView.asp?articejd =00000039131366, 2004년 11월
3 Sophos, 'Security threat report: 2009-State-sponsored cybercrime,' p. 13, Dec. 2008
4 G. Conti, 'Countering Denial of Information Attacks,' Blackhat 2005 & Defcon 13, http://www.defcon.org/html/defcon-13/dc13- speakers.html#Conti, July 2005
5 G. Conti and M. Ahamad, 'A Framework for Countering Denial of Information Attacks,' IEEE Security & Privacy November/December 2005, vol. 5, no. 6, pp. 50-56, Nov. 2005
6 H. Kratt, 'The Inside Story: A Disgruntled Employee Gets His Revenge,' SANS, pp. 6-7, Dec. 2004
7 Cybenko, A. Giani, and P. Thompson, 'Cognitive Hacking: A Battle for the Mind,' IEEE Computer, vol. 35, no. 8, pp. 50-56, Aug. 2002   DOI   ScienceOn
8 U.S. Department of Justice, Computer Crime & Intellectual Property Section, http://www.cybercrime.gov/index.html
9 국가사이버안전센터(NCSC). '인터넷 신종 사기 기법, 파밍(Pharming),' http://www1.ncsc.go.kr(동향분석정보 #44), 2005년 3월
10 B. Schneier, 'The Psychology of Security,' http://www.schneier.com/essay-155.html, Jan. 2008
11 경찰청, 2008 경찰백서, pp. 138-141, 2008년 9월
12 A. Litan, 'Increased Phishing and Online Attacks Cause Dip in Customer Confidence,' Gartner, http://www.gartner.com/DisplayDocument?doc_cd=129146, June 2005
13 M. Libicki, 'The Mesh and the net: Speculations on armed conflict in an age of free silicon,' McNair Paper no. 28, National Defense University, 1994
14 경찰청 사이버테러대응센터(HNETAN), http://www.netan.go.kr/indexjsp
15 네이버 백과사전, 두산 백과사전, http://l00.naver.com/l00.nhn?docid = 775269
16 KK Arthur, M.S. Oliver, H.S. Venter, and J.H.P. Eloff, 'Consideration Towards a Cyber Crime Profiling System,' The third International Conference on Availability, Reliability and Security, IEEE, pp. 1388-1393, Mar. 2008   DOI
17 J. Kee, 'Social Engineering: Manipulating the Source,' SANS, pp. 5-7, Apr. 2008
18 G. Takama, M. Association, and Papan, 'Security, Privacy Data Protection, and Perspectives of Counter Cyber Crime,' CodeGate Conference, Seoul, pp. 64-66, Apr. 2008
19 이대원, '정훈 교육과 심리전.' 육군 제132호, pp. 22-30, 2005년 7월
20 P. Thompson, Semantic Hacking and Intelligence and Security Informatics, Springer Berlin/Heidelberg, Jan. 2003
21 행정안전부 개인정보과, '개인정보 이해와 해설.' pp. 3-11, 2008년 6월
22 K Mitnick, The Art of Deception, John Wiley & Sons Inc., Oct. 2003
23 윤희영, '국경 없는 조폭 맥 마피아.' 디지틀 조선일보, http://news.chosun.com/site/datal htmLdir/2008/05/26/2008052601148.html, 2008년 5월
24 M. Allen, 'Social Engineering,' SANS, pp. 2-8, June 2006
25 Symantec, 'Underground economy July 07-June 08,' pp. 1-2, Nov. 2008