Open Access Open Access  Restricted Access Subscription Access

Enhancing Cybercrime Detection Through Big Data Analytics: A Conceptual Framework

Dharmraj Kumar Vitragi, Lalan Kumar Singh, Arif Mohammad Sattar, Mritunjay Kr. Ranjan

Abstract


The growing complexity of cybercrime reduction and prevention difficulties necessitates a different approach to dealing with the massive amounts of data involved. The issues of reducing and preventing cybercrime are becoming more complex as cybercrime becomes ingrained in our daily lives. When it comes to showcasing the original division of criminal activities, traditional police operations typically fall short, which means they contribute less to the right deployment of police resources. This study explores strategies for anticipating cybercrime. These techniques include assessing the geological zones that provide a higher level of danger but are outside the scope of standard enforcement powers using Hadoop technology for big data analytics. The method used an algorithm for topographical cybercrime mapping to pinpoint regions of the country with disproportionately high rates of cybercrime. By isolating extreme occurrences of cybercrime clusters, this strategy will shed light on recurring cybercrime trends. Clusters of cybercrime incidents can be used to illustrate common cybercriminal behaviour. The processing capability of the Hadoop platform is a key factor in the enhanced estimation technique. Cybercrime is a global threat because of the increasingly sophisticated tactics criminals employ to breach security systems and steal private information. Recent years have seen promising developments in the use of machine learning, deep learning, and transfer learning for the detection and prevention of cybercrime. Then, we look at transfer learning, early-stage algorithmic cybercrime prediction learning, and active and reinforcement learning. Finally, we synthesise our results and talk about potential future research areas for cybercrime.


Keywords


Cybercrime reduction, cybercrime clusters, Hadoop, police data, methods, algorithm, machine learning, deep learning, transfer learning

Full Text:

PDF

References


Rege M, Mbah RBK. Machine Learning for Cyber Defense and Attack. In Proceedings of the Data Analytics. 7th International Conference on Data Analytics; Athens, Greece. 2018 Nov; 73–78.

Bharati A, Sarvanaguru RA. Crime prediction and analysis using machine learning. Int Res J Eng Technol. 2018; 5(9): 1037–1042.

Marsland S. Machine Learning: An Algorithmic Perspective. FL, USA: CRC Press; 2015; 1–430.

Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor. 2016; 18(2): 1153–1176.

Bkassiny M, Li Y, Jayaweera SK. A survey on machine-learning techniques in cognitive radios. IEEE Commun Surv Tutor. 2013; 15(3): 1136–1159.

Mukherjee. Optical WDM Networks. Berlin, Germany: Springer Science & Business Media; 2017.

DeCusatis C. Optical interconnect networks for data communications. J Light Technol. 2014; 32(4): 544–552.

Song H, Kim B-W, Mukherjee B. Long-reach optical access networks: a survey of research challenges, demonstrations, and bandwidth assignment mechanisms. IEEE Commun Surv Tutor. 2010; 12(1): 112–123.

Chatterjee BC, Sarma N, Oki E. Routing and spectrum allocation in elastic optical networks: a tutorial. IEEE Commun Surv Tutor. 2015; 17(3): 1776–1800.

Talebi S, Alam F, Katib I, Khamis M, Salama R, Rouskas GN. Spectrum management techniques for elastic optical networks: a survey. Opt Switch Netw. 2014; 13: 34–48.

Tariq M, Uzma A. Security Analytics: Big Data Analytics for Cyber security A Review of Trends, Techniques and Tools. 2nd National Conference on Information Assurance (NCIA). 2013; 129–134.

Palak G, Nidhi T. An Approach towards Big Data –A Review. International Conference on Computing, Communication and Automation (IEEE). 2015; 118–123.

Babu TG, Babu GA. A survey on data science technologies & big data analytics. Int J Adv Res Comp Sci Soft Eng. 2016;6(2):322-7.

Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. Commun ACM. 2008; 51(1): 107–113.

Siddaraju D, Sowmya CL, Rashmi K, Rahul M. Efficient analysis of big data using map reduce framework. Int J Recent Dev Eng Technol. 2014 Jun;2(6):64-8.

Dhaka P, Johari R. Crib: Cybercrime investigation, data archival and analysis using big data tool. In 2016 International Conference on Computing, Communication and Automation (ICCCA). 2016 Apr; 117–121.

Silva JDA, Hruschka ER. An experimental study on the use of nearest neighbor-based imputation algorithms for classification tasks. Data Knowl Eng. 2013; 84: 47–58.

Najafabadi M, Villanustre F, Khoshgoftaar T, Seliya N, Wald R, Muharemagic E. Deep learning applications and challenges in big data analytics. J Big Data. 2015; 2: 1.

Quick D, Choo K-KR. Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit Investig. 2014; 11(4): 273–294.

Guarino A. Digital forensics as a big data challenge. In ISSE 2013 Securing Electronic Business Processes. Springer; 2013; 197–203.

Van Beek H, van Eijk E, van Baar R, Ugen M, Bodde J, Siemelink A. Digital forensics as a service: Game on. Digit Investig. 2015; 15: 20–38.

Zawoad S, Hasan R. Digital forensics in the age of big data: challenges, approaches, and opportunities. 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 2015. p. 1320-5. doi: 10.1109/HPCC-CSS-ICESS.2015.305.

Osisanwo FY. Supervised learning algorithms: classification and comparisons. Int J Comput Trends Technol. 2017; 48(3): 128–132.

Veena K, Meena K. Performance evaluation of cyber criminal detection techniques. International Journal of Simulation, Systems, Science and Technology (IJSSST). 2018; 19(4): 4.1–4.11.

Veena K, Meena K. Determination of performance to verify the synthetic identity theft by training the neural networks. Proceedings of IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, India. 2017 Aug; 246–250.




DOI: https://doi.org/10.37591/jons.v11i2.1042

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517