Abstract
The cybercrime has evolved as the years ago and the criminals use different techniques to capture the victims. Researchers have devised various techniques to detect the cybercriminal. Hence, a new technology has to be used to detect the Cybercrime. From the literature, it is analysed that many researchers have used various techniques to detect the Cybercrime. In this paper, the performance evaluation of various cybercriminal detection techniques are analysed using cluster computing techniques and Matlab is used to determine their performance. In this paper, 25 attributes are analysed to detect the cybercriminal through various techniques such as Gaussian Clustering, K Means, Fuzzy C Means and Fuzzy Clustering. Some of the attributes are taken as varying attributes and some of the attributes are taken as the nonvarying attributes. The crime clusters and genuine clusters are determined. The reasons for choosing the various attributes and the various techniques are also given. The analysis is further strengthened by changing the number of attributes used in each technique i.e., 25 attributes, 15 attributes, 10 attributes and 5 attributes. The analysis is further continued by using ¾ of total attributes, ½ of total attributes and ¼ of total attributes. The efficiency and time complexity is determined. In the paper justification of a number of attributes selected in each technique is also given. The accuracy analysis is done by comparing with Gaussian Clustering with K Means Clustering technique, Fuzzy C Means, and user profile analysis. The attributes which are significantly contributing for identifying the criminals are determined in each technique.
Similar content being viewed by others
References
Andrews C (2016) VR at the… crime scene. Eng Technol 11(3):42
Bhuvaneswari P et al (2015) A note on methods used for deception analysis and influence of thinking stimulus in deception detection. Int J Eng Technol 7(1):109–116
Chen J, Liu D, Hao F, Wang H (2019) Community detection in dynamic signed network: an intimacy evolutionary clustering algorithm. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01215-3
Coppolino L, D’Antonio S, Formicola V et al (2015) Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services. J Ambient Intell Human Comput 6(6):753–762
Edwards C (2006) Science at the scene of crime. Eng Technol 1(2):24–25
Fell J (2017) Cybercrime—history: hacking through history. J Mag Eng Technol 12(3):30–31
Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Conflict Resolut 4(1):1–12
Identity Theft supplement (2012 and 2014) Source: Bureau of Justice Statistics, National Crime Victimization Survey
India Times (2018) https://economictimes.indiatimes.com/news/politics-and-nation/government-to-set-up-apex-cyber-crimecoordination-centre/articleshow/62679762.cms. Accessed 2018
Javelin Strategy et al (2015) The new reality of synthetic ID fraud, how to battle the leading identity fraud tactic in the digital age. Equifax, 2015 Data Breach Fraud Impact Report, pp 1–8
Kranenbarg et al (2018) Cyber-offending and traditional offending over the life-course: an empirical comparison. J Dev Life Course Criminol 4(3):343–364
Meena K, Veena K (2017) Lie detection system using input voice signal. Int J Pure Appl Math 2017:121–125 (Special Issue, 2017)
Misra R et al (2012) Cybercrime investigation and network forensic system using honeypot. Int J Latest Trends Eng Technol 1(4):34–40
Tyagi A et al (2013) Brain–computer interface: a thought translation device turning fantasy into reality. Int J Biomed Eng Technol 11(2):197–211
Uma M et al (2011) A survey on various cyber attacks and their classification. Int J Netw Secur 15(5):390–396
Veena K, Meena K (2017) Determination of performance to verify the synthetic identity theft by training the neural networks. In: 2017 IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials, pp 246–50
Veena K, Meena K (2018) Identification of cybercriminal by analyzing the users profile. Int J Netw Secur 20(4):738–745
Veena K, Meena K (2019) Implementing file and real time based intrusion detections in secure direct method using advanced honeypot. Cluster Comput 22(Suppl 6):13361–13368. https://doi.org/10.1007/s10586-018-1912-x
Veena K, Visu P (2016) Detection of cybercrime: an approach using the lie detection technique and methods to solve it. In: International conference on information communication and embedded systems, ISBN 978-1-5090-2552-7, pp 1–6
Widdowson AJ (2016) CHEAT: an updated approach for incorporating human factors in cyber-security assessments. In: Information & communications. Cyber Security Engineering & Technology Reference
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Meena, K., Veena, K. Performance evaluation of cybercriminal detection through cluster computing techniques. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01605-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-019-01605-7