Applying Semantic Technologies to Fight Online Banking Fraud
Main Article Content
Abstract
Cybercrime tackling is a major challenge for Law Enforcement Agencies (LEAs). Traditional digital forensics and investigation procedures are not coping with the sheer amount of data to analyse, which is stored in multiple devices seized from distinct, possibly-related cases. Moreover, inefficient information representation and exchange hampers evidence recovery and relationship discovery. Aiming at a better balance between human reasoning skills and computer processing capabilities, this paper discusses how semantic technologies could make cybercrime investigation more efficient. It takes the example of online banking fraud to propose an ontology aimed at mapping criminal organisations and identifying malware developers. Although still on early stage of development, it reviews concepts to extend from well-established ontologies and proposes novel abstractions that could enhance relationship discovery. Finally, it suggests inference rules based on empirical knowledge which could better address the needs of the human analyst.
Article Details
The journal has exclusive rights over the first publication, printed and/or digital, of this academic text, which does not affect the copyright of the person responsible for the research.
The reproduction (in whole or in part) of the published material depends on the express mention of this journal as the origin, by citing the volume, edition number and the DOI link for cross-reference. For rights purposes, the original publication source must be recorded.
The use of the results published here in other vehicles of scientific divulgation, even if by the authors, depends on the express indication of this journal as a means of original publication, under penalty of characterizing a situation of self-plagiarism.
____________________________________________
Additional information and author statements
(scientific integrity)
Declaration of conflict of interest: The author(s) confirm that there are no conflicts of interest in conducting this research and writing this article.
Authorship statement: All and only researchers who meet the authorship requirements for this article are listed as authors; all co-authors are fully responsible for this work in its entirety.
Declaration of originality: The author(s) guarantee that the text published here has not been previously published elsewhere and that future republication will only be made with express reference to the original place of publication; also certifies that there is no plagiarism of third-party material or self-plagiarism.
____________________________________________
Archiving and distribution
The final published PDF can be archived, without restrictions, on any open access server, indexer, repository or personal page, such as Academia.edu and ResearchGate.