Cyber Crime and their Detection with Machine Learning: Comprehensive Study of Phishing and Cyberbullying

Authors

  • Atrakesh Pandey
  • Neeraj Kumar Tiwari

Keywords:

Cyber crime, Cyber-attacks, dos attack, machine learning, techniques, counter, fraud, cyber bullying, phishing, antivirus

Abstract

In Today’s world scenario cyber-crimes increased in large numbers, the criminals are now technologically advanced and very smart, and catching and preventing them is a tedious task, so this paper, analyzing of cyber-attacks cases of cyber bullying and dos attacks increased very much, this is used for stealing user data with the help of machine learning algorithm it can be countered. machines are more efficient, and accurate than humans, so we must take the help of machine learning techniques
to tackle this problem, fraudster make target the innocent people so that they can harm them, but we need some methods so that we can counter them if we are unable to counter them, they keep on harming on the innocent peoples, people suffer from depression and many of them attempt suicide due to cybercrimes like phishing and cyber bullying, many people are innocent and unaware about these frauds, these criminals needs to be stopped as soon as possible, if we don’t have enough techniques to tackle them, then there willpower to harm innocent people will keep on increasing and they will continue to harm and fraud innocent people life and money, the most important work is to stop them so that they cannot continue to harm people in terms of monetary or mentally, so we must make use of modern techniques to fight with them, machine learning techniques are one of those techniques which help us to fight with the fraudster so that people can surf internet freely, many antivirus companies are taking care of that.

References

Top 5 Applications of Machine Learning in Cyber Security - GeeksforGeeks [Internet]. GeeksforGeeks. 2020 [cited 2022 Sep 20]. Available from: https://www.geeksforgeeks.org/top-5-applications-of-machine-learning-in-cyber-security/

Peterson R. The Pros and Cons of Using AI in Cybersecurity [Internet]. Anonymania. Anonymania; 2019 [cited 2022 Sep 20]. Available from: https://anonymania.com/artificial-intelligence-cybersecurity-pros-cons/.

Dobhal-abhishek. GitHub - dobhal-abhishek/detecting-phishing-websites: detecting phishing websites using machine learning [Internet]. GitHub. 2022 [cited 2022 Sep 20]. Available from: https://github.com/dobhal-abhishek/detecting-phishing-websites

K. Reynolds, A. Kontostathis, and L. Edwards, "Using machine learning to detect cyberbullying," in 2011 10th International Conference on Machine learning and applications and workshops, 2011, vol. 2, pp. 241-244: IEEE

The 8 Most Common Cybersecurity Weaknesses to Watch for in Small Businesses [Internet]. ISACA. 2020 [cited 2022 Sep 20]. Available from: https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/the-8-most-common-cybersecurity-weaknesses-to-watch-for-in-small-businesses

M. A. Al-garadi, K. D. Varathan, and S. D. J. C. i. H. B. Ravana, "Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network," vol. 63, pp. 433-443, 2016.

Pandey, A., & Jain, R. (2023). 1–4D Protein Structures Prediction Using Machine Learning and Deep Learning from Amino Acid Sequences. In Proceedings of the Third International Conference on Information Management and Machine Intelligence (pp. 615-621). Springer, Singapore.

Haidar, M. Chamoun, and A. Serhrouchni, "Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content," in 2017 1st Cyber Security in Networking Conference (CSNet), 2017, pp. 1-8: IEEE.

Can data analytics and machine learning prevent cyberbullying? [Internet]. Selerity. 2021 [cited 2022 Sep 20]. Available from: https://seleritysas.com/blog/2021/06/11/can-data-analytics-and-machine-learning-prevent-cyberbullying/

Pandey, A., Pant, D., & Gupta, K. K. (2013). A Novel Approach on Color Image Refocusing and Defocusing. International Journal of Computer Applications, 73(3).

Published

2022-09-25