Applying Visualization and Analysis Data to Investigate Cyber Crimes (Case: Web Defacement)

Article Preview

Abstract:

Even now, many website owners still find cyberattacks—typically web defacement—terrifying. The Indonesian police's Criminal Investigation Unit is still working to track down and apprehend web hackers and vandals because such activity violates the law, could negatively impact an institution's day-to-day operations, necessitates additional funding for repairs, and carries the risk of database theft. In order to map the social network of the cybercrime suspect, this study used VOSviewer as a tool and Zone-H.org as a data source. Both of these sources can be accessible by the general public and used as Open Source Intelligence (OSINT) data. We were able to map one of the suspects who was apprehended by law enforcement, who goes by the pseudonym xgxs and goes by the username 13chmod37. This allowed us to give a general picture of the parties who might have been participating in the web defacement activity. The information we gave may be used by law enforcement to conduct additional investigations and track down additional offenders who are responsible for cyber attacks, particularly site defacement activity.

You might also be interested in these eBooks

Info:

Periodical:

Engineering Headway (Volume 6)

Pages:

203-210

Citation:

Online since:

April 2024

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2024 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] "Indonesia Cyber Security Monitoring Report 2019." Pusat Operasi Keamanan Siber Nasional Badan Siber dan Sandi Negara, 2020.

DOI: 10.22212/jp.v10i2.1447

Google Scholar

[2] Direktorat Tindak Pidana Siber Badan Reserse Kriminal Kepolisian Negara Republik Indonesia, "Statistik Laporan Polisi 2019," 2019. https://patrolisiber.id/statistic (accessed Jan. 08, 2020).

DOI: 10.37159/jmih.v6i2.2105

Google Scholar

[3] P. D. Ibnugraha, L. E. Nugroho, W. Widyawan, and P. I. Santosa, "RISK ANALYSIS OF DATABASE PRIVELEGE IMPLEMENTATION IN SQL INJECTION CASE," Jurnal Teknologi, vol. 78, no. 5–7, Art. no. 5–7, May 2016.

DOI: 10.11113/jt.v78.8724

Google Scholar

[4] "Virus Bulletin :: Hacktivism and website defacement: motivations, capabilities and potential threats." https://www.virusbulletin.com/conference/vb2017/abstracts/hacktivism-and-website-defacement-motivations-capabilities-and-potential-threats/ (accessed Nov. 04, 2020).

Google Scholar

[5] Badan Siber dan Sandi Negara, "Mengenali Serangan Siber Global dan Nasional Melalui Laporan Tahunan Honeynet Project BSSN-IHP Tahun 2018." 2019, Accessed: Feb. 08, 2019. [Online]. Available: https://bssn.go.id/mengenali-serangan-siber-global-dan-nasional-melalui-laporan-tahunan-honeynet-project-bssn-ihp-tahun-2018/.

DOI: 10.34010/gpsjournal.v7i1.8141

Google Scholar

[6] D. Hariyadi, "Analisis Serangan Web Defacement pada Situs Web Pemerintah Menggunakan ELK Stack," JISKA (Jurnal Informatika Sunan Kalijaga), vol. 4, no. 1, Art. no. 1, Nov. 2019.

DOI: 10.14421/jiska.2019.41-01

Google Scholar

[7] F. E. Nastiti, D. Hariyadi, and F. Bima, "TelegramBot: Crawling Data Serangan Malware dengan Telegram," CESS (Journal of Computer Engineering, System and Science), vol. 4, no. 1, p.51–54, Feb. 2019.

DOI: 10.24114/cess.v4i1.11436

Google Scholar

[8] I. M.-A. P. Jakarta, "Indonesia Web Defacement Attacks Analysis for Anti Web Defacement," Jurnal TICOM, vol. 3, no. 3, p.93324, 2015.

Google Scholar

[9] N. J. van Eck and L. Waltman, "VOS: A New Method for Visualizing Similarities Between Objects," in Advances in Data Analysis, Berlin, Heidelberg, 2007, p.299–306.

DOI: 10.1007/978-3-540-70981-7_34

Google Scholar

[10] M. Hofmann, A. Chisholm, and A. Chisholm, Text Mining and Visualization : Case Studies Using Open-Source Tools. Chapman and Hall/CRC, 2016.

DOI: 10.1201/b19007

Google Scholar

[11] "Open source intelligence base cyber threat inspection framework for critical infrastructures - IEEE Conference Publication." https://ieeexplore.ieee.org/document/7821730 (accessed Nov. 04, 2020).

DOI: 10.1109/ftc.2016.7821730

Google Scholar

[12] I. Kamiya, "OSINT (Open Source Intelligence) Activities in Corporate CSIRT." NTT-CERT, 2016.

Google Scholar

[13] F. Tabatabaei and D. Wells, "OSINT in the Context of Cyber-Security," 2016, p.213–231.

Google Scholar

[14] N. McKelvey, K. Curran, L. Toland, N. McKelvey, K. Curran, and L. Toland, "The Challenges of Data Cleansing with Data Warehouses," http://services.igi-global.com/resolvedoi/ resolve.aspx?doi=10.4018/978-1-5225-0182-4.ch005, Jan. 01, 1AD. https://www.igi-global.com/gateway/chapter/157685 (accessed Nov. 04, 2020).

DOI: 10.4018/978-1-5225-0182-4.ch005

Google Scholar

[15] "Low Carbon Education: A Review and Bibliometric Analysis." https://www.eu-jer.com/low-carbon-education-a-review-and-bibliometric-analysis (accessed Nov. 04, 2020).

Google Scholar

[16] "Bareskrim Ringkus Hacker Yang Retas 1.309 Situs Milik Pemerintah Termasuk Polri - DIVISI HUMAS POLRI." https://humas.polri.go.id/2020/07/07/bareskrim-ringkus-hacker-yang-retas-1-309-situs-milik-pemerintah-termasuk-polri/ (accessed Nov. 04, 2020).

DOI: 10.46976/litbangpolri.v23i1.95

Google Scholar