Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337429Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1958
 Gulcu C, Tsudik, G, ‘Mixing email with babel’. IEEE Conf. network and Distributed System Security, USA,1996, pp. 2-16.
 Jefferson, D.H, "Cybercrimes” National Crime Prevention Council http://www.ncpc.org/resources/files/pdf/internet-safety, 2012.
 Danezis G, ‘Better anonymous communications’ PhD thesis, University of Cambridge, 2004.
 Babu M, Parishath M.G, "What is Cybercrime” http://www.ncpc.org/resources/files/pdf/internet-safety , 2012.
 Wang Z, Stavrou A, "Exploiting Smart-Phone USB Connectivity for Fun and Profit,” In the proceedings of the 26th Annual Computer Security Application Conference (ACSAC), December 2010, pp.357-366.