Computational System to Classify Cyber Crime Offenses using Machine Learning

Particularly in the last decade, Internet usage has been growing rapidly. However, as the Internet becomes a part of the day to day activities, cybercrime is also on the rise. Cybercrime will cost nearly $6 trillion per annum by 2021 as per the cybersecurity ventures report in 2020. For illegal activities, cybercriminals utilize any network computing devices as a primary means of communication with a victims’ devices, so attackers get profit in terms of finance, publicity and others by exploiting the vulnerabilities over the system. Cybercrimes are steadily increasing daily. Evaluating cybercrime attacks and providing protective measures by manual methods using existing technical approaches and also investigations has often failed to control cybercrime attacks. Existing literature in the area of cybercrime offenses suffers from a lack of a computation methods to predict cybercrime, especially on unstructured data. Therefore, this study proposes a flexible computational tool using machine learning techniques to analyze cybercrimes rate at a state wise in a country that helps to classify cybercrimes. Security analytics with the association of data analytic approaches help us for analyzing and classifying offenses from India-based integrated data that may be either structured or unstructured. The main strength of this work is testing analysis reports, which classify the offenses accurately with 99 percent accuracy.

[1]  S Prabakaran,et al.  Survey of Analysis of Crime Detection Techniques Using Data Mining and Machine Learning , 2018 .

[2]  M Lakshmi Prasanthi Cyber Crime: Prevention & Detection , 2015 .

[3]  Praveen Kumar Reddy Maddikunta,et al.  A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU , 2020, Electronics.

[4]  Wazir Zada Khan,et al.  A deep neural networks based model for uninterrupted marine environment monitoring , 2020, Comput. Commun..

[5]  Amin Keshavarzi,et al.  Analysis and Prediction of Crimes by Clustering and Classification , 2015 .

[6]  George Tsakalidis,et al.  A Systematic Approach Toward Description and Classification of Cybercrime Incidents , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Wazir Zada Khan,et al.  A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks , 2020, IEEE Access.

[8]  Thar Baker,et al.  Analysis of Dimensionality Reduction Techniques on Big Data , 2020, IEEE Access.

[9]  Gulshan Kumar,et al.  Cybercrimes: A Proposed Taxonomy and Challenges , 2018, J. Comput. Networks Commun..

[10]  Gautam Srivastava,et al.  KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.

[11]  Tariq Rahim Soomro,et al.  Social Media-Related Cybercrimes and Techniques for Their Prevention , 2019, Appl. Comput. Syst..

[12]  Ajay Singh,et al.  Energy Efficient Fault Tolerable Routing Protocol for Wireless Sensor Networks , 2016 .

[13]  Kim-Kwang Raymond Choo,et al.  Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.

[14]  Debiao He,et al.  Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things , 2019, Ann. des Télécommunications.

[15]  Thar Baker,et al.  Providing secure and reliable communication for next generation networks in smart cities , 2020, Sustainable Cities and Society.

[16]  Ahmed J. Aljaaf,et al.  A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems , 2020, Handbook of Computer Networks and Cyber Security.

[17]  Jungkook An,et al.  A Data Analytics Approach to the Cybercrime Underground Economy , 2018, IEEE Access.

[18]  Shiju Sathyadevan,et al.  Crime analysis and prediction using data mining , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).

[19]  Guan Zhu Zhang Computer Forensics Based on Data Mining , 2014, ICRA 2014.

[20]  M. Williams,et al.  Crime sensing with big data: the affordances and limitations of using open source communications to estimate crime patterns , 2016 .

[21]  Harshita Patel,et al.  A review on classification of imbalanced data for wireless sensor networks , 2020, Int. J. Distributed Sens. Networks.