Survey on Different Data Mining Techniques for E- Crimes

Slides:



Advertisements
Similar presentations
Ph. D Student: TA Minh Thuy: USTH 2010 Director of thesis: Prof. LE Thi Hoai An Co-director: Dr. Lydia Boujeloud – Assala LITA, EA UFR MIM University.
Advertisements

Data Mining By Archana Ketkar.
Application of Apriori Algorithm to Derive Association Rules Over Finance Data Set Presented By Kallepalli Vijay Instructor: Dr. Ruppa Thulasiram.
Business Intelligence
CIT 858: Data Mining and Data Warehousing Course Instructor: Bajuna Salehe Web:
Web Usage Mining Sara Vahid. Agenda Introduction Web Usage Mining Procedure Preprocessing Stage Pattern Discovery Stage Data Mining Approaches Sample.
OOSE 01/17 Institute of Computer Science and Information Engineering, National Cheng Kung University Member:Q 薛弘志 P 蔡文豪 F 周詩御.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Social Mining Social Computing.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Chapter 1 Introduction to Data Mining
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Acct 6910 Building Business Intelligence Systems Class Introduction – From Data to Knowledge.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
Data Mining Concepts and Techniques Course Presentation by Ali A. Ali Department of Information Technology Institute of Graduate Studies and Research Alexandria.
Introduction to Machine Learning August, 2014 Vũ Việt Vũ Computer Engineering Division, Electronics Faculty Thai Nguyen University of Technology.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
Data Mining – Introduction (contd…) Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
DATA MINING and VISUALIZATION Instructor: Dr. Matthew Iklé, Adams State University Remote Instructor: Dr. Hong Liu, Embry-Riddle Aeronautical University.
Introduction to Machine Learning, its potential usage in network area,
Data Mining Functionalities
Data Mining.
Queensland University of Technology
Using Big Data clustering for improved security intelligence
CSE594 Fall 2009 Jennifer Wong Oct. 14, 2009
INTRODUCTION Enhanced Simplified Symmetric Key Encryption Algorithm by Mahendra kumar shrivas.
Sentiment analysis algorithms and applications: A survey
ANOMALY DETECTION FRAMEWORK FOR BIG DATA
Security Issues Formalization
DATA MINING © Prentice Hall.
Seminar On Cyber Crime Submitted To: Submitted By:
A Research Oriented Study Report By :- Akash Saxena
Data and Applications Security Developments and Directions
Digital Forensics Dr. Bhavani Thuraisingham
Lecture #11: Ontology Engineering Dr. Bhavani Thuraisingham
Trends in my profession, Information Technology
Data and Applications Security Introduction to Data Mining
Byung Joon Park, Sung Hee Kim
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Adrian Tuhtan CS157A Section1
Sangeeta Devadiga CS 157B, Spring 2007
Data Analysis.
A survey of network anomaly detection techniques
Smart Portal To Protect Child Online
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Data Science introduction.
Using Data Mining To Improve Company Strategies
Web Mining Department of Computer Science and Engg.
Integrating Deep Learning with Cyber Forensics
The Crime and Deviance Channel
Data and Applications Security Developments and Directions
TEXTAND WEB MINING.
Big DATA.
TEXT and WEB MINING.
Autonomous Network Alerting Systems and Programmable Networks
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
CSE594 Fall 2009 Jennifer Wong Oct. 14, 2009
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

Survey on Different Data Mining Techniques for E- Crimes VirtualCom-2016, International Virtual Conference on Computer Science, Engineering and Technology, 25-28 Dec 2016 Survey on Different Data Mining Techniques for E- Crimes Presented by: Nidhi Sethi, Dr. Pradeep Sharma, Dr. Bharat Mishra

ABSTRACT E crimes are the crimes performed with the help of computer. They are increasing in proportion with the technology usage of the common man. Detection of E crimes is incurring a very high cost to individual, organization and government as huge data collection and analysis is required to find them. A big challenge is faced by technocrats to detect E crimes efficiently from voluminous data. On the other hand data mining is powerful tool for extracting useful information from a huge data base. Thus this paper has merged these two fields in order to find a good solution to the problem. This paper will answer the question of how data mining techniques can be used to detect these unseen E crimes. It is also going to describe how Cybercrimes problems can be thought of as data mining problems

INTRODUCTION The E crime data is increasing day by day and becoming voluminous. E crime has become a global threat and to detect various E crimes from a large data set has become a universal challenge. Data mining plays an important role towards facing and solving this challenge of extraction of information from large E crimes collected data

Continued.. This paper is going to discuss the correlation of E crimes and data mining It is going to provide the framework for E crimes problems as data mining problems Initially we go through the concepts of various techniques then we are illustrating the concepts and challenges of E crimes; Also we are describing how data mining can be useful in solving these challenges with its vast set of methods Our contribution of the paper is to understand the application of different data mining techniques to detect various threats of E crimes.

Basic concepts in Data mining Meaning and definition: Data mining is a method of extraction of some patterns, correlations, associations of different entities from a large database. Various methods Association rule mining Clustering Classification and prediction Sequential pattern mining Outlier detection Web mining Entity extraction

Challenges of Cybercrimes Password Hacking Or Unauthorized Access Money Laundering, Stock Market Manipulations, Cyber Bullying Cyber Terrorism Credit Card Fraud Detection Printing And Publishing Pornographic Material Selling Of Illegal Material Narcotics, Cocaine, Weapons Creation Of Duplicate Currency Notes, Mark Sheets, Stamps Email spamming and email spoofing

Framework for Cybercrime as data mining problems

How data mining can be useful With time sequence mining one can find the time when the next E crime is going to occur. Sequence of E crime patterns in a specified time interval can be generated with it. Clustering can be used in detection of stock market price manipulation. Clustering is also very important in email and spamming. Region wise occurring computer crimes can also be grouped with the help of clustering Outlier analysis can be used to locate the hidden data associated with the various computer crimes

Continued… Outlier Analysis can also be applied in finding the frauds, which are generally .unusual transactions, appeared in financial transactions. Association rule mining in computer crime analysis is generally used to detect various crime patterns which are meaningful as well as useful. With ARM one can also .detect the rare crime patterns. Email spoofing or phishing can be detected with the help of an intelligent classifier of adversarial data mining. Entity Extraction finds the text from an unstructured or semi structured data

Continued… Entity Extraction helps in detection of cybercrimes especially cyber bullying and child predation as data collection for these are usually unstructured in nature. Classification and prediction techniques are generally used at early stages in E crimes detection process. Classification and prediction is very much useful in classifying the different categories and further sub categories of crimes. With help of Classification and prediction one can predict a certain group category involving in certain crimes

Conclusion This paper provides an overview of the necessity and utility of data mining in computer security especially in detection of cybercrimes. Data mining offers benefits to the organizations and individuals in extraction of meaningful crime data. This paper also discusses how different data mining techniques and algorithms can be used in solving different cyber problems. It also provides the outline of cybercrime problems that can be solved with data mining process. Thus this paper can be extended in future research of specific data mining technique detecting a particular type of computer crime.

REFERENCES Thuraisingham, Bhavani, et al. "Data Mining for Security Applications". B. Thuraisingham “Data Mining and Cyber Security” IEEE(2004) Sethi, Nidhi. "A Review on Recent Computer Crimes." International Journal of Computer Science & Engineering Technology (IJCSET) ISSN: 2229-3345 Vol. 7 No. Nalini, K., and L. Jaba Sheela. "A survey on data mining in cyber bullying." International Journal on Recent and Innovation Trends in Computing and Communication 2.7 (2014): 1865-1869. Malathi, A., and S. Santhosh Baboo. "An enhanced algorithm to predict a future crime using data mining." (2011). Usha, D., and K. Rameshkumar. "A complete survey on application of frequent pattern mining and association rule mining on crime pattern mining."International Journal of Advances in Computer Science and Technology 3.4 (2014). Mangesh D. Salunke, Prof. Ruhi Kabra “Denial-of-Service Attack Detection” International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014) V R Sadasivam , Dr K Duraisamy , R Mani Bharathi, “Association Rule Mining and Frequent Pattern Mining Applications on Crime Pattern Mining: A Comprehensive Survey” International Journal of Innovative Research in Science, Engineering and Technology “ISSN(Online) : 2319 - 8753Vol. 4, Special Issue 6, May 2015

THANK YOU