The Computational System To Classify Cyber Crime Offenses With Twitter Dataset Using Effdt Classification

Main Article Content

M. Nisha
Dr. J. Jebathangam

Abstract

The Rapid growth of the Internet in the current decade enables the users to access the internet for day-to-day activities. People access the internet for many purposes: entertainment, Transactions, educational purposes and business. On the other hand cyber-crime has increased equally in terms of handling the massive data in the cloud using the access failures. Cyber-crimes are eventually increasing and reducing cyber-attacks for the data stored in the cloud. Existing framework and approaches fail to control the cybercrime attacks and thus many officers are increased because of the predictive control failure. The present study is focused on developing an effective computational method using a machine learning algorithm to analyze the cybercrime rate and to classify the cybercrimes. The system utilized Natural Language Processing (NLP) is used to process the text data. The particle Swarm Optimization algorithm is used to extract the features from the text stop. The main process involved here is the end sampled feed forward decision tree algorithm used to classify the text where any cyber assault are injected into the text. The main operation is to remove the read and features in the text and classifies the existing test text data Using SVM classifier and K nearest neighbor classifier in order to obtain the efficient classifier.

Downloads

Download data is not yet available.

Article Details

How to Cite
M. Nisha, & Dr. J. Jebathangam. (2023). The Computational System To Classify Cyber Crime Offenses With Twitter Dataset Using Effdt Classification. Journal of Advanced Zoology, 44(S7), 1463–1472. https://doi.org/10.53555/jaz.v44iS7.3328
Section
Articles
Author Biographies

M. Nisha

Department of computer science, Vels Institute of Science Technology and Advanced Studies Chennai, India.

Dr. J. Jebathangam

Department of computer science, Vels Institute of Science Technology and Advanced Studies Chennai, India

References

World Economic Forum. The Global Risks Report 2019. Available online: http://www3.weforum.org/ docs/WEF_Global_Risks_Report_2019.pdf (accessed on 25 August 2020).

Satyapanich, T.; Ferraro, F.; Finin, T. CASIE: Extracting Cybersecurity Event Information from Text. Umbc Fac. Collect. 2020, 34, 8749–8757. [CrossRef]

Noor, U.; Anwar, Z.; Amjad, T.; Choo, K.K.R. A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Future Gener. Comput. Syst. 2019, 96, 227–242. [CrossRef]

Yagcioglu, S.; Seyfioglu, M.S.; Citamak, B.; Bardak, B.; Guldamlasioglu, S.; Yuksel, A.; Tatli, E.I. Detecting Cybersecurity Events from Noisy Short Text. arXiv 2019, arXiv:1904.05054.

Mazoyer, B.; Cagé, J.; Hervé, N.; Hudelot, C. A French Corpus for Event Detection on Twitter. In Proceedings of the 12th Language Resources and Evaluation Conference, Marseille, France, 11–16 May 2020; pp. 6220–6227.

Da Costa Abreu, M.; Araujo De Souza, G. Automatic offensive language detection from Twitter data using machine learning and feature selection of metadata. In Proceedings of the IEEE World Congress on Computational Intelligence (IEEE WCCI), Glasgow, UK, 19–24 July 2020.

D. Soni, M. Sharma, and S. K. Khatri, "Political opinion mining using E-social network data," in Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS), 2017 International Conference on, 2017, pp. 163-165.

R. Kamal, M. A. Shah, A. Hanif, and J. Ahmad, "Real-time opinion mining of Twitter data using spring XD and Hadoop," in Automation and Computing (ICAC), 2017 23rd International Conference on, 2017, pp. 1-4.

M. Nimbarte and M. O. Thakare, "User tracking using tweet segmentation and word," in Electronics, Communication and Aerospace Technology (ICECA), 2017 International conference of, 2017, pp. 664-668.

N. Tanwani, S. Kumar, A. H. Jalbani, S. Soomro, M. I. Channa, and Z. Nizamani, "Student opinion mining regarding educational system using facebook group," in Electrical Engineering and Computing Technologies (INTELLECT), 2017 First International Conference on Latest trends in, 2017, pp. 1-5.

M. Hood and A. L. Duffy, "Understanding the relationship between cyber-victimisation and cyber-bullying on Social Network Sites: The role of moderating factors," Personality and Individual Differences, 2017.

R. Pawar, Y. Agrawal, A. Joshi, R. Gorrepati, and R. R. Raje, "Cyberbullying Detection System with Multiple Server Configurations," in 2018 IEEE International Conference on Electro/Information Technology (EIT), 2018, pp. 0090-0095.

Le Sceller, Q.; Karbab, E.B.; Debbabi, M.; Iqbal, F. Sonar: Automatic detection of cyber security events over the twitter stream. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 2017; pp. 1–11.

Bose, A.; Behzadan, V.; Aguirre, C.; Hsu, W.H. A novel approach for detection and ranking of trendy and emerging cyber threat events in twitter streams. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Vancouver, BC, Canada, 27–30 August 2019; pp. 871–878.

Ji, T.; Zhang, X.; Self, N.; Fu, K.; Lu, C.T.; Ramakrishnan, N. Feature driven learning framework for cybersecurity event detection. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Vancouver, BC, Canada, 27–30 August 2019; pp. 196–203.

Q. Le Sceller, E. B. Karbab, M. Debbabi, and F. Iqbal, “SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream,” in Proc. of the 12th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, 2017.

X. Liao, K. Yuan, X. Wang, Z. Li, L. Xing, and R. Beyah, “Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence,” in Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). Association for Computing Machinery, 2016.

C. Sabottke, O. Suciu, and T. Dumitras, “Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits,” in Proc. of the 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, 2015.

A. Attarwala, S. Dimitrov, and A. Obeidi, “How efficient is Twitter: Predicting 2012 U.S. presidential elections using Support Vector Machine via Twitter and comparing against Iowa Electronic Markets,” in Intelligent Systems Conference, 2017.

Yurnalita, “Cyberbullying on Social Networking Twitter (Trending Topic Semiotics Analysis),” Faculty of social and political sciences, University of Syiah Kuala, Banda Aceh Darussalam, 2016.