Skip to main content

Advertisement

Log in

Performance evaluation of cybercriminal detection through cluster computing techniques

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The cybercrime has evolved as the years ago and the criminals use different techniques to capture the victims. Researchers have devised various techniques to detect the cybercriminal. Hence, a new technology has to be used to detect the Cybercrime. From the literature, it is analysed that many researchers have used various techniques to detect the Cybercrime. In this paper, the performance evaluation of various cybercriminal detection techniques are analysed using cluster computing techniques and Matlab is used to determine their performance. In this paper, 25 attributes are analysed to detect the cybercriminal through various techniques such as Gaussian Clustering, K Means, Fuzzy C Means and Fuzzy Clustering. Some of the attributes are taken as varying attributes and some of the attributes are taken as the nonvarying attributes. The crime clusters and genuine clusters are determined. The reasons for choosing the various attributes and the various techniques are also given. The analysis is further strengthened by changing the number of attributes used in each technique i.e., 25 attributes, 15 attributes, 10 attributes and 5 attributes. The analysis is further continued by using ¾ of total attributes, ½ of total attributes and ¼ of total attributes. The efficiency and time complexity is determined. In the paper justification of a number of attributes selected in each technique is also given. The accuracy analysis is done by comparing with Gaussian Clustering with K Means Clustering technique, Fuzzy C Means, and user profile analysis. The attributes which are significantly contributing for identifying the criminals are determined in each technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Andrews C (2016) VR at the… crime scene. Eng Technol 11(3):42

    Article  Google Scholar 

  • Bhuvaneswari P et al (2015) A note on methods used for deception analysis and influence of thinking stimulus in deception detection. Int J Eng Technol 7(1):109–116

    MathSciNet  Google Scholar 

  • Chen J, Liu D, Hao F, Wang H (2019) Community detection in dynamic signed network: an intimacy evolutionary clustering algorithm. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-019-01215-3

    Article  Google Scholar 

  • Coppolino L, D’Antonio S, Formicola V et al (2015) Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services. J Ambient Intell Human Comput 6(6):753–762

    Article  Google Scholar 

  • Edwards C (2006) Science at the scene of crime. Eng Technol 1(2):24–25

    Article  Google Scholar 

  • Fell J (2017) Cybercrime—history: hacking through history. J Mag Eng Technol 12(3):30–31

    Google Scholar 

  • Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Conflict Resolut 4(1):1–12

    MathSciNet  Google Scholar 

  • Identity Theft supplement (2012 and 2014) Source: Bureau of Justice Statistics, National Crime Victimization Survey

  • India Times (2018) https://economictimes.indiatimes.com/news/politics-and-nation/government-to-set-up-apex-cyber-crimecoordination-centre/articleshow/62679762.cms. Accessed 2018

  • Javelin Strategy et al (2015) The new reality of synthetic ID fraud, how to battle the leading identity fraud tactic in the digital age. Equifax, 2015 Data Breach Fraud Impact Report, pp 1–8

  • Kranenbarg et al (2018) Cyber-offending and traditional offending over the life-course: an empirical comparison. J Dev Life Course Criminol 4(3):343–364

    Article  Google Scholar 

  • Meena K, Veena K (2017) Lie detection system using input voice signal. Int J Pure Appl Math 2017:121–125 (Special Issue, 2017)

    Google Scholar 

  • Misra R et al (2012) Cybercrime investigation and network forensic system using honeypot. Int J Latest Trends Eng Technol 1(4):34–40

    Google Scholar 

  • Tyagi A et al (2013) Brain–computer interface: a thought translation device turning fantasy into reality. Int J Biomed Eng Technol 11(2):197–211

    Article  MathSciNet  Google Scholar 

  • Uma M et al (2011) A survey on various cyber attacks and their classification. Int J Netw Secur 15(5):390–396

    Google Scholar 

  • Veena K, Meena K (2017) Determination of performance to verify the synthetic identity theft by training the neural networks. In: 2017 IEEE international conference on smart technologies and management for computing, communication, controls, energy and materials, pp 246–50

  • Veena K, Meena K (2018) Identification of cybercriminal by analyzing the users profile. Int J Netw Secur 20(4):738–745

    Google Scholar 

  • Veena K, Meena K (2019) Implementing file and real time based intrusion detections in secure direct method using advanced honeypot. Cluster Comput 22(Suppl 6):13361–13368. https://doi.org/10.1007/s10586-018-1912-x

    Article  Google Scholar 

  • Veena K, Visu P (2016) Detection of cybercrime: an approach using the lie detection technique and methods to solve it. In: International conference on information communication and embedded systems, ISBN 978-1-5090-2552-7, pp 1–6

  • Widdowson AJ (2016) CHEAT: an updated approach for incorporating human factors in cyber-security assessments. In: Information & communications. Cyber Security Engineering & Technology Reference

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Meena.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meena, K., Veena, K. Performance evaluation of cybercriminal detection through cluster computing techniques. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01605-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-019-01605-7

Keywords

Navigation