Skip to main content
Erschienen in: Wireless Personal Communications 2/2024

03.04.2024

IGO_CM: An Improved Grey-Wolf Optimization Based Classification Model for Cyber Crime Data Analysis Using Machine Learning

verfasst von: Swati Sharma, Varsha Sharma

Erschienen in: Wireless Personal Communications | Ausgabe 2/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The internet utilization has been developing quickly, mostly in previous eras. Though, by way of the internet develops an important section of the daily life routine, cybercrime is similarly on the grow. The prices of cybercrime will approximately five lakh crores dollars per year through 2022 according to cyber security endeavours details in 2021. The cyber attackers exploit some internet resources as a principal way of transformation through a victim system; therefore intruders generate benefit based on economic, promotional and many more through developing the susceptibilities over devices. The computing cybercrime threats and providing security procedures through physical schemes utilizing previous methodological techniques and moreover examinations have unsuccessful many times to govern cybercrime threats. The previous literature in field of cybercrime threats agonizes from absence of evaluation schemes to guess the cybercrimes, mainly on unstructured information. Hence, an Improved Grey-wolf Optimization based Classification Model (IGO-CM) is developed with the help of chaos system and information entropy utilizing machine learning schemes for cybercrime data analysis to compute the rate of cybercrime by classifying the cybercrime data. The protection examinations by means of the relationship of data analysis methodologies provide services to examine and classify crime data in unstructured form taking from India. The implementation of IGO-CM is performed on MATLAB 2021a tool for unstructured cybercrime data and the outcomes describe the superior performance of IGO-CM depending on accuracy, F-Measure, standard deviation, purity index, intra-cluster distance, root mean square error, and time complexity against a popular classification scheme K-Means, and some optimization schemes like ACO, ALO, PSO and GO.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Prabakaran, S. & Mitra S. (2018). Survey of analysis of crime detection techniques using data mining and machine learning. In Journal of physics: conference series (pp. 1–12). Prabakaran, S. & Mitra S. (2018). Survey of analysis of crime detection techniques using data mining and machine learning. In Journal of physics: conference series (pp. 1–12).
7.
Zurück zum Zitat Vavilapalli, V. K., Murthy, A. C., Douglas, C., Agarwal, S., Konar, M., Evans, R., Graves, T., Lowe, J., Shah, H., Seth, S., Saha, B., Curino, C., O’Malley, O., Radia, S., Reed, B., & Baldeschwieler, E. (2019). Apache Hadoop YARN: Yet another resource negotiator. In SoCC, ACM, Santa Clara, California, USA (pp. 1–16). Vavilapalli, V. K., Murthy, A. C., Douglas, C., Agarwal, S., Konar, M., Evans, R., Graves, T., Lowe, J., Shah, H., Seth, S., Saha, B., Curino, C., O’Malley, O., Radia, S., Reed, B., & Baldeschwieler, E. (2019). Apache Hadoop YARN: Yet another resource negotiator. In SoCC, ACM, Santa Clara, California, USA (pp. 1–16).
9.
Zurück zum Zitat Khare, A., Gupta, R., & Shukla, P. K. (2020). A grey wolf optimization algorithm (GWOA) for node capture attack to enhance the security of wireless sensor network. International Journal of Scientific & Technology Research, 9(3), 206–209. Khare, A., Gupta, R., & Shukla, P. K. (2020). A grey wolf optimization algorithm (GWOA) for node capture attack to enhance the security of wireless sensor network. International Journal of Scientific & Technology Research, 9(3), 206–209.
10.
Zurück zum Zitat Vinmalar, F. L., & Kombaiya, A. K. (2020). An improved dragonfly optimization algorithm based feature selection in high dimensional gene expression analysis for lung cancer recognition. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(8), 896–908.CrossRef Vinmalar, F. L., & Kombaiya, A. K. (2020). An improved dragonfly optimization algorithm based feature selection in high dimensional gene expression analysis for lung cancer recognition. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(8), 896–908.CrossRef
11.
Zurück zum Zitat Chantar, H., Tubishat, M., Essgaer, M., & Mirjalili, S. (2021). Hybrid binary dragonfly algorithm with simulated annealing for feature selection. SN Computer Science, 2(295), 1–11. Chantar, H., Tubishat, M., Essgaer, M., & Mirjalili, S. (2021). Hybrid binary dragonfly algorithm with simulated annealing for feature selection. SN Computer Science, 2(295), 1–11.
12.
Zurück zum Zitat Herrera, V. M., Khoshgoftaar, T. M., Villanustre, F. & Furht, B. (2019). Random forest implementation and optimization for Big Data analytics on LexisNexis’s high performance computing cluster platform. Journal of Big Data, 6(68), 1–36. Herrera, V. M., Khoshgoftaar, T. M., Villanustre, F. & Furht, B. (2019). Random forest implementation and optimization for Big Data analytics on LexisNexis’s high performance computing cluster platform. Journal of Big Data, 6(68), 1–36.
13.
Zurück zum Zitat Kiruthika, S., Kalaimani, E. V. R. M., Sudha, R., & Suganthi, K. (2021). ACO Feature selection and Novel Black Widow meta-heuristic Learning rate optimized CNN for Early diagnosis of Parkinson`s disease. Turkish Journal of Computer and Mathematics Education, 12(7), 809–817. Kiruthika, S., Kalaimani, E. V. R. M., Sudha, R., & Suganthi, K. (2021). ACO Feature selection and Novel Black Widow meta-heuristic Learning rate optimized CNN for Early diagnosis of Parkinson`s disease. Turkish Journal of Computer and Mathematics Education, 12(7), 809–817.
14.
Zurück zum Zitat Dai, H. N., Wong, R. C. W., Wang, H., Zheng, Z. & Vasilakos, A. V. (2019). Big data analytics for large scale wireless networks: challenges and opportunities. ACM, 52(5), 1–46. Dai, H. N., Wong, R. C. W., Wang, H., Zheng, Z. & Vasilakos, A. V. (2019). Big data analytics for large scale wireless networks: challenges and opportunities. ACM, 52(5), 1–46.
17.
Zurück zum Zitat Cui, X., Li, Y., Fan, J., Wang, T., & Zheng, Y. (2020). A hybrid improved dragonfly algorithm for feature selection. IEEE Access, 8, 155619–155629.CrossRef Cui, X., Li, Y., Fan, J., Wang, T., & Zheng, Y. (2020). A hybrid improved dragonfly algorithm for feature selection. IEEE Access, 8, 155619–155629.CrossRef
19.
Zurück zum Zitat Soomro, T. R., & Mumtaz, H. (2019). Social media-related cybercrimes and techniques for their prevention. Applied Computer Systems, 24, 9–17.CrossRef Soomro, T. R., & Mumtaz, H. (2019). Social media-related cybercrimes and techniques for their prevention. Applied Computer Systems, 24, 9–17.CrossRef
21.
Zurück zum Zitat Ganesan, M., & Mayilvahanan, P. (2017). Cyber crime analysis in social media using data mining technique. International Journal of Pure and Applied Mathematics, 116, 413–424. Ganesan, M., & Mayilvahanan, P. (2017). Cyber crime analysis in social media using data mining technique. International Journal of Pure and Applied Mathematics, 116, 413–424.
22.
Zurück zum Zitat Ben-Nun, T., & Hoefler, T. (2019) Demystifying parallel and distributed deep learning: An in-depth concurrency analysi, pp. 1–47. Ben-Nun, T., & Hoefler, T. (2019) Demystifying parallel and distributed deep learning: An in-depth concurrency analysi, pp. 1–47.
23.
Zurück zum Zitat Çagrı, B., Saglam, A., & R. B., Li, S. (2018). Automatic detection of cyber security related accounts on online social networks: twitter as an example. In Proceedings of the 9th international conference on social media and society, Copenhagen, Denmark (pp. 236–240). Çagrı, B., Saglam, A., & R. B., Li, S. (2018). Automatic detection of cyber security related accounts on online social networks: twitter as an example. In Proceedings of the 9th international conference on social media and society, Copenhagen, Denmark (pp. 236–240).
24.
Zurück zum Zitat Hong, R., & Chandra, A. (2019). DLion: decentralized distributed deep learning in micro-clouds (pp. 1–9). Hong, R., & Chandra, A. (2019). DLion: decentralized distributed deep learning in micro-clouds (pp. 1–9).
25.
Zurück zum Zitat Khan, M. A., Pradhan, S. K., & Fatima, H. (2017). Applying data mining techniques in cyber crimes. In Proceedings of 2nd international conference on anti-cyber crimes (ICACC), Abha, Saudi Arabia (pp. 213–216). Khan, M. A., Pradhan, S. K., & Fatima, H. (2017). Applying data mining techniques in cyber crimes. In Proceedings of 2nd international conference on anti-cyber crimes (ICACC), Abha, Saudi Arabia (pp. 213–216).
27.
Zurück zum Zitat Mitta, S. (2019). Cognitive computing architectures for machine (Deep) learning at scale. In Proceedings (pp. Vol. 1(186)). MDPI. Mitta, S. (2019). Cognitive computing architectures for machine (Deep) learning at scale. In Proceedings (pp. Vol. 1(186)). MDPI.
33.
Zurück zum Zitat Ravikumar, K., & Kannan, A. R. (2018). Spatial Data Mining for Prediction of natural events and disaster management based on fuzzy logic using hybrid PSO. Taga Journal, 14, 858–878. Ravikumar, K., & Kannan, A. R. (2018). Spatial Data Mining for Prediction of natural events and disaster management based on fuzzy logic using hybrid PSO. Taga Journal, 14, 858–878.
34.
Zurück zum Zitat Khare, A., Shukla, P., & Silakari, S. (2014). Secure and fast chaos based encryption system using digital logic circuit. International Journal Computer Network and Information Security, 6, 25–33.CrossRef Khare, A., Shukla, P., & Silakari, S. (2014). Secure and fast chaos based encryption system using digital logic circuit. International Journal Computer Network and Information Security, 6, 25–33.CrossRef
35.
Zurück zum Zitat Khare, A., Shukla, P. K., Rizvi, M. A., & Stalin, S. (2016). An intelligent and fast chaotic encryption using digital logic circuits for Ad-Hoc and ubiquitous computing. Entropy, 18(201), 1–27. Khare, A., Shukla, P. K., Rizvi, M. A., & Stalin, S. (2016). An intelligent and fast chaotic encryption using digital logic circuits for Ad-Hoc and ubiquitous computing. Entropy, 18(201), 1–27.
Metadaten
Titel
IGO_CM: An Improved Grey-Wolf Optimization Based Classification Model for Cyber Crime Data Analysis Using Machine Learning
verfasst von
Swati Sharma
Varsha Sharma
Publikationsdatum
03.04.2024
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2024
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-024-10952-4

Weitere Artikel der Ausgabe 2/2024

Wireless Personal Communications 2/2024 Zur Ausgabe

Neuer Inhalt