grooming incidents can be found for example on the
web site www.perverted-justice.com or from live
process where the researcher can pretend a minor
user through chat room or IM conversations. The
categorization among the attack categories will be
achieved through keyword identification. Dialog
analysis will indicate basic keywords that indicate
the presence in specific attack stage.
4 CONCLUSIONS
The implementation of a grooming attack detection
system demands for deep analysis of the
methodologies that predators follow. Besides, the
decision making algorithm about sending or not a
warning signal, leads to a probabilistic approach for
risk modeling. In this paper, most of the existing risk
modeling methods are analyzed and compared
according to a set of proposed criteria and in order to
be implemented on the intended grooming attack
detection system. Bayesian and Markovian methods
seem to match the criteria. However, the
implementation of each method demands for proper
conditional-transmission probability calculation. For
this purpose, stochastic simulation through dialog
analysis is selected for use, in a large number of
known grooming incidents. This dialog analysis
should also include the categorization of captured
dialogs into various attack categories.
The basic advantage of the intended grooming
attack detection system is instant warning. The
system analyzes the captured dialogs, calculates the
probability of grooming attack and then decides
whether to send a signal or not. Thus, parents can be
warned about a possible danger on time and make all
the necessary actions to prevent any catastrophe.
REFERENCES
Ayyub, B., 2003 Risk Analysis in Engineering and
Economics Taylor & Francis Ltd 2003 ISBN
1584883952
Bauman, S., 2007 CyberBullying: a Virtual Menace,
National Coalition Against Bullying, Melbourne,
Australia,www.ncab.org.au/Assets/Files/Bauman,%20
S.%20Cyberbullying.pdf accessed October 2009
Bouti A, Kadi A. D., 1994 A State-of-the-art review of
FMEA/FMECA International Journal of Reliability,
Quality and Safety Engineering, vol1 pp.515-543
Dean, S., (2007) Sexual Predators: How to recognize them
on the internet and on the street - how to keep your
kids away, Silver Lake Publishing.
Finkelhor, D. and Ormrod, R., 2000 Characteristics of
Crimes against Juveniles, Juvenile Justice Bulletin, pp.
1-11.
Kalman, R. E., 1960 The Seminal Kalman Filter Paper
http://www.cs.unc.edu/~welch/kalman/kalmanPaper.ht
ml accessed October 2009
Kemeny, J. G. and Snell, J. L., 1976 Finite Markov chains,
Springer-Verlag, ISBN: 978-0-387-90192-3
Krause, P., Clark, D., 1993 Representing Uncertain
Knowledge: An Artificial Intelligence Approach,
Springer, 1 edition, ISBN-10: 0792324331
Krone, T., 2005 Queensland Police Stings in Online Chat
rooms no. 301, Australian Institute of Criminology
www.aic.gov.au/documents/B/C/E/%7BBCEE2309-
71E3-4EFA-A533-A39661BD1D29%7Dtandi301.pdf
accessed October 2009
Madan, B. B., Gogeva-Popstojanova, K., Vaidyanathan,
K., Trivedi, K.S., 2002 Modeling and quantification of
security attributes of software systems, Dependable
Systems and Networks, Proceedings of International
Conference on Dependable Systems and Networks
vol., no. pp. 505-514
Modarres, M., Krivtsov, V., Kaminskiy, M., 1999
Reliability Engineering and Risk Analysis, Taylor &
Francis Ltd New York 1999 ISBN 0824720008
O'Connell, R., (2003) A typology of child
cybersexploitation and online grooming practices,
Cyberspace Research Unit, University of Central
Lancashire (UK), http://image.guardian.co.uk/sys-
files/Society/documents/2003/07/24/Netpaedoreport.p
df accessed October 2009
Rish, I., 2001 An empirical study of the naive Bayes
classifier IJCAI 2001 Workshop on Empirical
Methods in Artificial Intelligence
Stanley, J., (2001) Child abuse and the Internet, Australian
Institute of Family Studies, Melbourne,
http://aifs.org.au/nch/pubs/issues/issues15/issues15.pd
f accessed October 2009
Subrahmanyam, K., Smhel, K. and Greenfield, P., 2006
Connecting Developmental Constructions to the
Internet: Identity presentation and Sexual Exploration
in Online Teen Chat Rooms, National Science
Foundation Grant
Taylor, C., Krings, A., Alves-Foss, J., 2009 Risk Analysis
and Probabilistic Survivability Assessment (RAPSA):
An Assessment Approach for Power Substation
Hardening, http://
www.csds.uidaho.edu/papers/Taylor02a.pdf accessed
October 2009
SECRYPT 2010 - International Conference on Security and Cryptography
220