TOWARDS RISK BASED PREVENTION OF GROOMING ATTACKS

Dimitrios Michalopoulos, Ioannis Mavridis

Abstract

The increasing incidents of children sexual exploitation through cyberspace demand for proper protection with technological defense mechanisms. This paper aims to present and evaluate methods and tools that are appropriate towards the prevention of child sexual abuse through Internet based communications. Attacking categories and strategies that predators follow are analyzed and modeled. Moreover, a comparative review of existing risk modeling methods, which is based on a set of proposed criteria, is presented. This comparison results in the conclusion that only two of the reviewed risk modeling methods can be adapted on the intended grooming attack detection system: Bayesian and Markovian. The proposed approach is concluded with a discussion on particular methods and tools for accurate attack probability calculation.

References

  1. Ayyub, B., 2003 Risk Analysis in Engineering and Economics Taylor & Francis Ltd 2003 ISBN 1584883952
  2. Bauman, S., 2007 CyberBullying: a Virtual Menace, National Coalition Against Bullying, Melbourne, Australia,www.ncab.org.au/Assets/Files/Bauman,%20 S.%20Cyberbullying.pdf accessed October 2009
  3. Bouti A, Kadi A. D., 1994 A State-of-the-art review of FMEA/FMECA International Journal of Reliability, Quality and Safety Engineering, vol1 pp.515-543
  4. Dean, S., (2007) Sexual Predators: How to recognize them on the internet and on the street - how to keep your kids away, Silver Lake Publishing.
  5. Finkelhor, D. and Ormrod, R., 2000 Characteristics of Crimes against Juveniles, Juvenile Justice Bulletin, pp. 1-11.
  6. Kalman, R. E., 1960 The Seminal Kalman Filter Paper http://www.cs.unc.edu/welch/kalman/kalmanPaper.ht ml accessed October 2009
  7. Kemeny, J. G. and Snell, J. L., 1976 Finite Markov chains, Springer-Verlag, ISBN: 978-0-387-90192-3
  8. Krause, P., Clark, D., 1993 Representing Uncertain Knowledge: An Artificial Intelligence Approach, Springer, 1 edition, ISBN-10: 0792324331
  9. Krone, T., 2005 Queensland Police Stings in Online Chat rooms no. 301, Australian Institute of Criminology www.aic.gov.au/documents/B/C/E/%7BBCEE2309- 71E3-4EFA-A533-A39661BD1D29%7Dtandi301.pdf accessed October 2009
  10. Madan, B. B., Gogeva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S., 2002 Modeling and quantification of security attributes of software systems, Dependable Systems and Networks, Proceedings of International Conference on Dependable Systems and Networks vol., no. pp. 505-514
  11. Modarres, M., Krivtsov, V., Kaminskiy, M., 1999 Reliability Engineering and Risk Analysis, Taylor & Francis Ltd New York 1999 ISBN 0824720008
  12. O'Connell, R., (2003) A typology of child cybersexploitation and online grooming practices, Cyberspace Research Unit, University of Central Lancashire (UK), http://image.guardian.co.uk/sysfiles/Society/documents/2003/07/24/Netpaedoreport.p df accessed October 2009
  13. Rish, I., 2001 An empirical study of the naive Bayes classifier IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence
  14. Stanley, J., (2001) Child abuse and the Internet, Australian Institute of Family Studies, Melbourne, http://aifs.org.au/nch/pubs/issues/issues15/issues15.pd f accessed October 2009
  15. Subrahmanyam, K., Smhel, K. and Greenfield, P., 2006 Connecting Developmental Constructions to the Internet: Identity presentation and Sexual Exploration in Online Teen Chat Rooms, National Science Foundation Grant
  16. Taylor, C., Krings, A., Alves-Foss, J., 2009 Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening, http:// www.csds.uidaho.edu/papers/Taylor02a.pdf accessed October 2009
Download


Paper Citation


in Harvard Style

Michalopoulos D. and Mavridis I. (2010). TOWARDS RISK BASED PREVENTION OF GROOMING ATTACKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 217-220. DOI: 10.5220/0002986702170220


in Bibtex Style

@conference{secrypt10,
author={Dimitrios Michalopoulos and Ioannis Mavridis},
title={TOWARDS RISK BASED PREVENTION OF GROOMING ATTACKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={217-220},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002986702170220},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - TOWARDS RISK BASED PREVENTION OF GROOMING ATTACKS
SN - 978-989-8425-18-8
AU - Michalopoulos D.
AU - Mavridis I.
PY - 2010
SP - 217
EP - 220
DO - 10.5220/0002986702170220