Maksimova E.A., Berdnik M.V., Tsybanov V.Yu., Alekseenko A.V. Investigation of Computer Crimes

INVESTIGATION OF COMPUTER CRIMES

Elena Aleksandrovna Maksimova

Candidate of Technical Sciences, Associate Professor,

Head of Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky,100, 400062 Volgograd, Russian Federation

Mariya Viktorovna Berdnik

Associate Professor, Department of Computer Technologies and Information Security,

Kuban State Technological University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Moskovskaya St., 2, 350072 Krasnodar, Russian Federation

Vadim Yurevich Tsybanov

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky,100, 400062 Volgograd, Russian Federation

Anna Viktorovna Alekseenko

Laboratory Assistant, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky,100, 400062 Volgograd, Russian Federation

Abstract. In recent years, the number of computer crimes is constantly increasing. The number of criminal attacks over the last 10 years has increased by 22.3 % and continues to increase, on the average, in 3.5 times a year. The annual damage caused by this criminal assault amounts to 613,7 million roubles; the average damage from one computer to the victim of a crime is equal to 1.7 million roubles. At the same time, only about 49 % are successfully solved. Guilty verdicts are rendered only in 25.5 % cases from the total number of criminal cases. The average number of criminal cases, in which production is suspended, is 43.5 % and clearly reflects the low degree of professionalism of law enforcement bodies in the activities of disclosure, investigation and prevention of these criminal attacks.

Since standard algorithms of actions not taking into account the specificities of this type of criminal conduct are used when working with the computer crimes, we observe the growth of cybercrime and the low rate of disclosure. Thus, a new approach is necessary for investigating computer crimes, taking into account the specifics of the crime and modeling a potential attacker, especially at the stage of investigation. Model intruder information security is a set of assumptions about one or more possible offenders of information security, their qualifications, their technical and material means, etc. The paper presents the developed model of the attacker capable of committing a computer crime. The authors work out the architecture used in the algorithmic model allowing to automate the process of computer crimes investigation.

Key words: computer crimes, model of attacker, architecture of model, investigation stage, the algorithm of actions.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (1_Maximova_Berdnik_Zubanov_Alekseenko.pmd.pdf) 1_Maximova_Berdnik_Zubanov_Alekseenko.pmd.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/536
667 DownloadsUpdate this file (1_Maximova_Berdnik_Zubanov_Alekseenko.pmd.pdf)