Friday, January 5, 2018


Cybercrime Formula
By Raul Bernardino

Abstract:
Modeling a cybercrime is important for Information and Technology professionals to learn the symptoms and to be alerted (ready at any time) when the hackers have penetrated the systems environment. The cybercrime behavior can be formulated into the mathematical model. The base of cybercrime activity starts from unethical behaviors. Moreover, the hackers develop information from social engineering or gain information from spoofing, sniffing, skimming, Distributed Denial of Services (DDoS), and other techniques and forming the knowledge.
Keywords: cybercrime, unethical, social engineering, and knowledge

Introduction:
Nowadays cybercriminals activities are using encryption too. Therefore it is hard to detect their movements in the networking systems. The hackers are also using a similar methodology as IT professionals.

We can take several techniques as an example such as:
1.      Spoofing technique. Spoofing is a technique used to access unauthorized computers, where the attacker (hacker) enters by way of pretending to falsify identity that they are the host or a computer that can be trusted.
o   Types of Spoofing:
IP Spoofing: the technique of this attack is complex, and consists of several components. The first security exploits, concerned working with stealth computers and in the relationship of trust that you are the other person.  
DNS Spoofing: take the name of the Domain Name Server (DNS) of other systems with the DNS domain of an endangering the legitimate.
Identify Spoofing: the Act of infiltration by using official identity illegally. By using it, the intruder will be able to access everything that is on the network.
2.      Sniffing:
Sniffing packets allows individuals to tap the data that is transmitted over the network. This technique was used by the professional to diagnose network problems. However, the hackers use this way to tap the unencrypted data such as the user ID and password of the user.

To formulate the cybercrime activities, I came up RB formula, which stands for Raul Bernardino
Cybercrime = unethical + skill*opportunity                                                               …RB1
Skill = information + knowledge                                                                                …RB2
The relation between the RB1 and RB2 equation becomes:
Cybercrime = unethical + (information*opportunity) + (Knowledge*opportunity) …RB3
Unethical = Gray Hat + Black Hat                                                                            …RB4

The gray hat is still in the area of the balancing (gray) therefore, to be unethical, the gray hat person is expected bigger than his/her intention is more than (>) 50% or it is equivalent to 50% + 1. This means cybercrime would happen when the hackers desire to dominate a system, host, document, data, and information that clearly has no right to possession (unethical). Furthermore, the hackers searching essential information through techniques such as spoofing, sniffing, DDoS, Skimming, and so on, however, it all depends on whether the hackers get a chance to do a  penetration and gain the information. Furthermore, the information is developed and becomes available knowledge and then creates strategic plans to do reliable attacks to gain financial benefit and control critical and confidential information illegally. It includes hiding and eliminating their footpath of hacking (footprints).

Conclusion:
Cybercrime is an illegal activity over the internet and or networking performed by an individual, a group, and even organizations (hackers or hackers) to gain confidential information and or a financial benefit.

Reference list:
Bernardino, R. (2017) Cybercrime [online]. Available from: https://www.researchgate.net/publication/321124293_CYBERCRIME (Accessed date: 6 January 2018)
Bernardino, R. (2017) Modeling a Cybercrime [online]. Available from: https://www.researchgate.net/publication/321145590_Modeling_a_Cybercrime (Accessed date: 6 January 2018)



2 comments: