Skip to main content
Skip main navigation
No Access

A framework for cyber war against international terrorism

Published Online:pp 29-39https://doi.org/10.1504/IJITST.2011.039677

Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from ‘passive’ to ‘active’. Consistently, this should be reflected on the internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of ‘cooperation’ and ‘universal legislation’. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using ‘honeypots’ and ‘web mining’ techniques by organising national efforts.

Keywords

online security, international terrorism, honeypots, web mining, universal legislation

References

  • 1. A. Barfar, S. Mohammadi, '‘Honeypots: intrusion deception’' ISSA Journal (2007) Google Scholar
  • 2. B. Clinton, '‘New York University speech’' (2002) Google Scholar
  • 3. Duez, Bannelier Ed., '‘De la définition à la labellisation: le terrorisme comme construction sociale’' Supra Note (2002) Google Scholar
  • 4. M.D. Filippo, '‘Terrorist crimes and international co-operation: critical remarks on the definition and inclusion of terrorism in the category of international crimes’' European Journal of International Law (2008) Google Scholar
  • 5. T. Freiburger, J.S. Crane, '‘A systematic examination of terrorist use of the internet’' International Journal of Cyber Criminology (2008) Google Scholar
  • 6. Privacy Online: Fair Information Practices in the Electronic Marketplace (2000) Google Scholar
  • 7. J. Han, M. Kamber, Data Mining: Concepts and Techniques (2006) Google Scholar
  • 8. International Bar Association (IBA), International Terrorism: Legal Challenges and Responses (2003) Google Scholar
  • 9. L.J. Janczewski, A. Colarik, Cyber Warfare and Cyber Terrorism (2008) Google Scholar
  • 10. I. Lachow, C. Richardson, '‘Terrorist use of the internet: the real story’' JFQ: Joint Force Quarterly (2007) Google Scholar
  • 11. M. Last, A. Kandel, '‘Fighting terror in cyberspace’' World Scientific (2005) Google Scholar
  • 12. Lutz, H-J. Koch Ed., '‘Was ist Terrorismus? Definitionen, Wandel, Perspektiven’' Terrorismus Rechtsfragen der Äußeren und Inneren Sicherheit (2002) Google Scholar
  • 13. S. O’Rourke, '‘Global reach: terrorists and the internet’' Paper Presented at the Proceedings of the 7th Australian Information Warfare and Security Conference (2006) Google Scholar
  • 14. N. Provos, T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection (2007) Google Scholar
  • 15. M. Schrage, '‘Digital dishonesty as best policy’' Breakthroughs Magazine (2004) Google Scholar
  • 16. Sorel, '‘Existe-t-il une définition universelle du terrorisme?’' Le Droit International Face au Terrorisme (2002) Google Scholar
  • 17. L. Spitzner, Honeypots: Tracking Hackers (2002) Google Scholar
  • 18. L. Spitzner, Honeypots: are They Illegal (2003) Google Scholar
  • 19. B. Thuraisingham, Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (2003) Google Scholar
  • 20. G. Weimann, 'How Modern Terrorism Uses the Internet' (2004) Google Scholar
  • 21. S. Zimmerman, R. Plesco, T. Rosenberg, (2002) Google Scholar