Table Of ContentMichael Chau
Hsinchun Chen
G. Alan Wang
Jau-Hwang Wang (Eds.)
0
4 Intelligence and
4
8
S
C Security Informatics
N
L
Pacific Asia Workshop, PAISI 2014
Tainan, Taiwan, May 13, 2014
Proceedings
123
Lecture Notes in Computer Science 8440
CommencedPublicationin1973
FoundingandFormerSeriesEditors:
GerhardGoos,JurisHartmanis,andJanvanLeeuwen
EditorialBoard
DavidHutchison
LancasterUniversity,UK
TakeoKanade
CarnegieMellonUniversity,Pittsburgh,PA,USA
JosefKittler
UniversityofSurrey,Guildford,UK
JonM.Kleinberg
CornellUniversity,Ithaca,NY,USA
AlfredKobsa
UniversityofCalifornia,Irvine,CA,USA
FriedemannMattern
ETHZurich,Switzerland
JohnC.Mitchell
StanfordUniversity,CA,USA
MoniNaor
WeizmannInstituteofScience,Rehovot,Israel
OscarNierstrasz
UniversityofBern,Switzerland
C.PanduRangan
IndianInstituteofTechnology,Madras,India
BernhardSteffen
TUDortmundUniversity,Germany
DemetriTerzopoulos
UniversityofCalifornia,LosAngeles,CA,USA
DougTygar
UniversityofCalifornia,Berkeley,CA,USA
GerhardWeikum
MaxPlanckInstituteforInformatics,Saarbruecken,Germany
Michael Chau Hsinchun Chen
G. Alan Wang Jau-Hwang Wang (Eds.)
Intelligence and
Security Informatics
Pacific Asia Workshop, PAISI 2014
Tainan, Taiwan, May 13, 2014
Proceedings
1 3
VolumeEditors
MichaelChau
UniversityofHongKong,HongKongSAR
E-mail:[email protected]
HsinchunChen
TheUniversityofArizona,Tucson,AZ,USA
E-mail:[email protected]
G.AlanWang
VirginiaTech,Blacksburg,VA,USA
E-mail:[email protected]
Jau-HwangWang
CentralPoliceUniversity,TakangVillage,Taiwan,R.O.C.
E-mail:[email protected]
ISSN0302-9743 e-ISSN1611-3349
ISBN978-3-319-06676-9 e-ISBN978-3-319-06677-6
DOI10.1007/978-3-319-06677-6
SpringerChamHeidelbergNewYorkDordrechtLondon
LibraryofCongressControlNumber:2014936743
LNCSSublibrary:SL4–SecurityandCryptology
©SpringerInternationalPublishingSwitzerland2014
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof
thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,
broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology
nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection
withreviewsorscholarlyanalysisormaterialsuppliedspecificallyforthepurposeofbeingenteredand
executedonacomputersystem,forexclusiveusebythepurchaserofthework.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheCopyrightLawofthePublisher’slocation,
inistcurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Permissionsforuse
maybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violationsareliabletoprosecution
undertherespectiveCopyrightLaw.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Whiletheadviceandinformationinthisbookarebelievedtobetrueandaccurateatthedateofpublication,
neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityforanyerrorsor
omissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,withrespecttothe
materialcontainedherein.
Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India
Printedonacid-freepaper
SpringerispartofSpringerScience+BusinessMedia(www.springer.com)
Preface
Intelligence and security informatics (ISI) is an interdisciplinary research area
concerned with the study of the development and use of advanced information
technologiesandsystemsfornational,international,andsocietalsecurity-related
applications. In the past few years, we have witnessed ISI experiencing tremen-
dousgrowthandattractingsignificantinterestinvolvingacademicresearchersin
related fields as well as practitioners from both governmentagencies and indus-
try.
In 2006, the First Workshop on ISI was held in Singapore in conjunction
with PAKDD, with most contributors and participants coming from the Pacific
Asian region. The Second Pacific Asia Workshop on ISI, PAISI 2007, was held
in Chengdu. Following that, the annual PAISI workshop was held in Taipei,
Taiwan (2008), Bangkok, Thailand (2009), Hyderabad, India (2010), Beijing,
China (2011, 2013), and Kuala Lumpur, Malaysia (2012).
Building on the momentum of these ISI meetings, we held PAISI 2014 to-
gether with PAKDD 2014in Tainan, Taiwan, in May 2014.PAISI 2014brought
together researchers from a variety of fields and provided a stimulating forum
for ISI researchers in Pacific Asia and other regions of the world to exchange
ideas and report research progress. This volume of Springer’s Lecture Notes in
Computer SciencecontainsresearchpaperspresentedatPAISI 2014.Itpresents
a significant view on regional data sets and case studies, including cybercrime,
information security engineering, and text mining.
We wish to express our gratitude to all members of the Workshop Program
Committee andadditionalreviewerswho providedhigh-quality,constructivere-
view comments within a tight schedule. Our special thanks go to the PAKDD
2014OrganizingCommitteeandworkshopchairs.Wewouldalsoliketoacknowl-
edge the excellent cooperation with Springer in the preparation of this volume.
Lastbutnotleast,wethankallresearchersintheISIcommunityfortheirstrong
and continuous support of the PAISI series and other related intelligence and
security informatics research.
May 2014 Michael Chau
Hsinchun Chen
G. Alan Wang
Jau-Hwang Wang
Organization
Workshop Co-chairs
Michael Chau The University of Hong Kong, Hong Kong
Hsinchun Chen The University of Arizona, USA
G. Alan Wang Virginia Tech, USA
Jau-Hwang Wang Central Police University, Taiwan
Program Committee
Robert Weiping Chang Central Police University, Taiwan
Kuo-Tay Chen National Taiwan University, Taiwan
Uwe Glaesser Simon Fraser University, Canada
Eul Gyu Im Hanyang University, Korea
Da-Yu Kao Central Police University, Taiwan
Siddharth Kaza Towson University, USA
Paul W.H. Kwan University of New England, Australia
Wai Lam The Chinese University of Hong Kong,
Hong Kong
Mark Last Ben-Gurion University of the Negev, Israel
Ickjai Lee James Cook University, Australia
You-Lu Liao Central Police University, Taiwan
Xiaochen Li The Chinese Academy of Sciences, China
Hongyan Liu Tsinghua University, China
Hsin-Min Lu National Taiwan University, Taiwan
Jun Luo The Chinese Academy of Sciences, China
Xin Robert Luo University of Minnesota, USA
Byron Marshall Oregon State University, USA
Dorbin Ng The Chinese University of Hong Kong,
Hong Kong
Shaojie Qiao Southwest Jiaotong University, China
Aixin Sun Nanyang Technological University, Singapore
Paul Thompson Dartmouth College, USA
Jennifer J. Xu Bentley University, USA
Additional Reviewers
Nalbandyan, Narek
Yaghoubi Shahir, Hamed
Abstract of Invited Talk
Security Informatics Using Social Media Data
Ee-Peng Lim
School of Information Systems, Singapore Management University
[email protected]
Abstract. Social media has become more diverse and pervasive in re-
cent years due to unprecedented popular adoption of mobile and tablet
devices. These new devices enable very fine grained tracking of users’
attributes and behaviors as well as their relationships with other users.
Whenweanalysethelargevolumeofsocialmediadata,manyinteresting
insightscanbederived.Manyoftheseinsightshelpustoprofileindivid-
ualusersandeventsinwayswhichwerenotpossiblebefore.Inthistalk,
we describe a few interesting social media analytics works that address
someimportantsecurityinformaticsproblemsincludingsocietal-scaleso-
cial media data sensing, user profiling, relationship mining and outlier
detection. We will also highlight a few social media analytics tools that
illustrate thesecurity informatics capabilities.
Table of Contents
Rational Choice Observation of Malware Authors in Taiwan........... 1
Da-Yu Kao
Knowledge Management in Cybercrime Investigation – A Case Study
of Identifying Cybercrime Investigation Knowledge in Taiwan.......... 8
Weiping Chang and Peifang Chung
User Management in Information Security Engineering Environment
ISEE ........................................................... 18
Yuichi Goto, Liqing Xu, Ning Zhang, and Jingde Cheng
ActiveandPersonalizedServicesinanInformationSecurityEngineering
Cloud Based on ISO/IEC 15408 ................................... 35
Liqing Xu, Yuichi Goto, Ahmad Iqbal Hakim Suhaimi,
Ning Zhang, and Jingde Cheng
Identify the Online Product Comments with Suspicious Chinese
Content ........................................................ 49
Ping Han Lei, Pingyu Hsu, and Ming Shien Cheng
Automatically Explore Inter-Discipline Technology from Chinese
Patent Documents ............................................... 65
Ming Shien Cheng and Pingyu Hsu
A LDA Feature Grouping Method for Subspace Clustering of Text
Data ........................................................... 78
Yeshou Cai, Xiaojun Chen, Patrick Xiaogang Peng, and
Joshua Zhexue Huang
Author Index.................................................. 91
Rational Choice Observation of Malware
Authors in Taiwan
Da-Yu Kao
Department of Information Management, Central Police University, Taoyuan, Taiwan 333
[email protected]
Abstract. Cybercrime is a significantly new phenomenon, which is facilitated by
the internet. The internet not only makes it much easier for malware authors or
hackers to bypass national boundaries, but also offer more sophisticated tech-
niques to support malicious program creation for malware authors. This paper
outlines an observation from Taiwan malware authors in past decades. The case
description and author behavior in rational choice theories is discussed. The goal
is to analyze their mentality and thinking patterns from a standpoint of rational
choice theory. Profit emerges as a main factor in repeat offenders. They freely
choose to write malicious programs after rational evaluation where the antic-
ipated costs and the expected benefits are weighed against each other.
Keywords: Malware Author, Rational Choice Theory, Cybercrime, CIH Virus.
1 Introduction
Internet is a part of an information revolution that has offered opportunities for
committing and being a victim of crime. Of approximately 50 thousands cases
of cybercrime reported in Taiwan during the past decade, the majority were moti-
vated by trivial disputes between online gamers. In Taiwan, 4 persons authored the
malware (malicious software) earning the most publicity. They are known by their
hacker pseudonyms: “CIH”, “Birdspy”, “Peep”, and “keylog [1].” Although these
noted authors are malware programmers, they have different life-course on crime.
This paper aims to understand the extent between cyber technology and malware
crime in Taiwan. The purpose of this study is to contribute to the literature by ex-
amining the links among rational choice and malware authors. More specifically, it
aims to find out how advancements in cyber technology have impacted cybercrime
and how often malware authors are relying on Information and Communication
Technologies (ICTs) to commit the criminal offences.
In Section 2, the literature reviews of malware activities and Relational
Choice Theory are discussed. Section 3 describes four Taiwan malware authors of
CIH Virus, Birdspy Backdoor, Peep Trojan and Keylog Spyware. Discussions and
analyses relational choice observation are presented in Section 4. The conclusion is
drawn in Section 5.
M. Chau et al. (Eds.): PAISI 2014, LNCS 8440, pp. 1–7, 2014.
© Springer International Publishing Switzerland 2014