Criminal activities are a manifestation of unseen termites that are slowly but steadily decaying the deep rooted pillars of ethics and values established in our society. The evolving technology can be very well be utilized as arms and ammunitions by the law agencies against this social evil of criminalization. In our paper, we propose a novel and unified approach to examine and investigate digital crimes as well as physical crimes. Our model works on the principle of integrating various computerized forensic tools to analyze the reported digital crime and adopts data mining techniques for detecting crime and predicting the criminal in the case of physical crimes. In the first phase the user registered in the system can file a valid case by entering the details of the crime occurred. Depending on the type of crime the case will be evaluated. For detecting and investigating intruder attacks launched on a user's system, a set of digital tools is used and the generated report is sent to the intended user. In the event of a physical crime, k-means clustering algorithm is used to generate crime clusters. Based on the crime location the clusters are diagrammatically represented on google maps. We have further incorporated the use of Naïve Bayes classification algorithm for predicting the criminals for a particular crime case based on similar crime activities that happened in the past. If no previous record is found then the new crime pattern is added to the existing crime dataset. Our computerized forensic model aids the victim to amicably cooperate with the law agencies and aims to accelerate the process of crime investigation in order to combat rapidly growing criminal activities.
[1]
Nilakshi Jain,et al.
Computer forensic tool using history and feedback approach
,
2015,
INFOCOM 2015.
[2]
Wojciech Mazurczyk,et al.
Cyber Crime
,
2016,
Secur. Commun. Networks.
[3]
Hsinchun Chen,et al.
CrimeNet explorer: a framework for criminal network knowledge discovery
,
2005,
TOIS.
[4]
Nilakshi Jain,et al.
Digital forensic framework using feedback and case history keeper
,
2015,
2015 International Conference on Communication, Information & Computing Technology (ICCICT).
[5]
Manuel Delgado,et al.
Using open source for forensic purposes
,
2012,
OSDOC '12.
[6]
Subhayu Chakravorty.
Data mining techniques for analyzing murder related structured and unstructured data
,
2015
.
[7]
Mike Burmester,et al.
Tracking cyberstalkers: a cryptographic approach
,
2005,
CSOC.
[8]
David Preston,et al.
A New Approach of Digital Forensic Model for Digital Forensic Investigation
,
2011
.
[9]
Amr M. Youssef,et al.
Towards discovering criminal communities from textual data
,
2011,
SAC '11.
[10]
Tushar Gupta,et al.
Crime detection and criminal identification in India using data mining techniques
,
2014,
AI & SOCIETY.