• Title/Summary/Keyword: Crime Record

Search Result 24, Processing Time 0.03 seconds

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

An Analysis of Relationship Between Word Frequency in Social Network Service Data and Crime Occurences (소셜 네트워크 서비스의 단어 빈도와 범죄 발생과의 관계 분석)

  • Kim, Yong-Woo;Kang, Hang-Bong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.229-236
    • /
    • 2016
  • In the past, crime prediction methods utilized previous records to accurately predict crime occurrences. Yet these crime prediction models had difficulty in updating immense data. To enhance the crime prediction methods, some approaches used social network service (SNS) data in crime prediction studies, but the relationship between SNS data and crime records has not been studied thoroughly. Hence, in this paper, we analyze the relationship between SNS data and criminal occurrences in the perspective of crime prediction. Using Latent Dirichlet Allocation (LDA), we extract tweets that included any words regarding criminal occurrences and analyze the changes in tweet frequency according to the crime records. We then calculate the number of tweets including crime related words and investigate accordingly depending on crime occurrences. Our experimental results demonstrate that there is a difference in crime related tweet occurrences when criminal activity occurs. Moreover, our results show that SNS data analysis will be helpful in crime prediction model as there are certain patterns in tweet occurrences before and after the crime.

Spatial Crime Analysis using GIS (GIS를 이용한 범죄의 공간적 특성)

  • Jeon, Jae-Han;Yang, Hyo-Jin;Kwon, Jay-Hyoun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.15 no.1 s.39
    • /
    • pp.3-7
    • /
    • 2007
  • To deal with the modern intellectual criminal acts, various efforts have been tried. Especially, it is not difficult to watch the recent activities to analyze the criminal characteristics spatially using computing and GIS technology. In this study, the spatial features and patterns of crime are investigated. Based on the real criminal record in Seoul Korea, the crime is reconstituted with four major categories such as assault, larceny, robbery, and rape. Then the variables are derived based on the theory of criminology. The kernal density analysis is performed to investigate the criminal distribution, and the correlation between the main criminal causes and the criminal outbreak is examined by buffering analysis. In addition, the land price and land usages are correlated with social-economic factors of criminal patterns to produce the final crime map.

  • PDF

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

Age-Crime Curve in Korea (한국의 연령-범죄곡선)

  • 박철현
    • Korea journal of population studies
    • /
    • v.24 no.2
    • /
    • pp.149-177
    • /
    • 2001
  • This is a study on age-crime curve in Korea. Three data was used in this study as following: First is the crime statistics as aggregated data. Second is the police record(N=3.541 offences) of the male ex-offenders(N=988) who have been released in eleven prisons in 1987 as individual data. Third is the self-reported group-interview data(N=10.198 offences) administered to the male prisoners(N=979) in ten correctional facilities including eight adult prisons, one juvenile prison and one juvenile training center as another individual data. Generally, the right-skewness of age-crime curve has been explained through the difference of crime rate between early starters and late starters. Moffitt explains that this is because of the higher participation rate of the juvenile period of adolescence-limited offenders, but Godttfredson and Hirschi explain that this is because of a similar distribution in the crime rate of both early starters and late starters. the analysis of this study shows that Godttfredson and Hirschi’s explanation on the generality of age-crime-curve distribution is correct, but this can be modified by various factors like a economic crisis. And the peak age of juvenile period is consistent with the Moffitt’s hypothesis that the peak age is contributed to the increase of crime rate of late starters, not with Godttfredson and Hirschi’s one.

  • PDF

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation (디지털 포렌식 조사에서 효율적인 파일 복구를 위한 레코드 파일 카빙 기법)

  • Park, Minsu;Park, Jungheum;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.93-102
    • /
    • 2013
  • These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don't contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.

The Production and Contents of Illustrations Used in the 'House Search Report' During the Japanese Colonial Period (일제강점기 '가택수색조서'에 사용된 도판의 생산과 내용에 관한 연구)

  • Kim, Jeong-Hee;Han, Dong-Soo
    • Journal of architectural history
    • /
    • v.32 no.6
    • /
    • pp.33-47
    • /
    • 2023
  • The study confirmed the "house search report(家宅搜索調書)" containing criminal records during the Japanese colonial period, as well as the production process and the way of expressing the illustrations contained in them. It also explored architectural values through analysis of the location and use of the building. This records the discovery of evidence by searching the residences of those involved in the crime from 1919 to 1922. The illustrations contained in this record were not standardized, so the contents of the article differed depending on the author's background and cultural experience. Nevertheless, this painting reflects the regional characteristics of traditional houses located throughout the Korean Peninsula. It is also evidence that the house was used for cultural, commercial, and industrial purposes, beyond the general assumption that it was used only for residential purposes. The "House Search Report(家宅搜索調書)" provides information on ordinary buildings that existed as the background of everyday life, rather than buildings with a specific purpose or exceptional design. It is evaluated as an important resource for understanding the diverse life and spatial structures of buildings during that time.