Advertisement

Cybercrime: To Detect Suspected User’s Chat Using Text Mining

  • Khan SameeraEmail author
  • Pinki Vishwakarma
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 106)

Abstract

In this fast growing era of modern technology, it has become important need for people to communicate with each other. Various mediums like social media are used for communication business, organizational details, etc. Due to the increase in technology, there are chances of performing the crimes in newer ways. Using these Social Networking Sites (SNS), many criminal activities have the ability to extract the information. Such activities are spamming, cyber prediction, cyber threatening, killing, blackmailing, phishing, etc. The suspicious messages can be transferred via different SNS, mobile phones, or other sources. Most of the crime-related activities on information on a web are in text format, which is tedious task to trace those criminal activities. Detecting and exploring the crime and identifying the criminals are involved in the analyzing “crime process.” Criminology is a field of using text mining techniques that describe the complexity of relationship between crime datasets. Text mining technique is an effective way to detect and predict criminal activities. Text mining is the process of extracting interesting information or knowledge or patterns from the unstructured text that are from different sources. Since this uses text mining algorithm to continuously check for suspicious words even if they are in short forms or phrases, then they find social graph of users. In this framework, n-gram technique with SCHITS (Hyperlink-Induced Topic Search) algorithm is used to find suspected message, user, sessions, etc. Information can be extracted using social graph-based text mining, and also the suspected user’s profile has been found.

Keywords

Social network analysis (SNA) Social graph Cybercrime investigation 

References

  1. 1.
    Nasa, D.: Text mining techniques—a survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(4) (2012)Google Scholar
  2. 2.
    Mahesh, T.R., Suresh, M.B., Vinayababu, M.: Text mining: advancements, challenges and future directions. Int. J. Rev. Comput. 2009–2010 lJRIC & LLSGoogle Scholar
  3. 3.
    Adamic, L., Zhang, J., Bakshy, E., Ackerman, M.: Knowledge sharing and yahoo answers: everyone knows something. In Proceeding of the 17th International Conference on World Wide Web. ACM (2008)Google Scholar
  4. 4.
    Lew, A., Mauch, H.: Intoduction to Data Mining Principles‖, SCI. Springer (2006) (Text mining)Google Scholar
  5. 5.
    Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. J. ACM, 46(5), 604e32 (1999)Google Scholar
  6. 6.
    Abulaish, M., Anwar, T.: A web content mining approach for tag cloud generation. In: Proceedings of the 13th International Conference on IIWAS, p. 52e9 (2011)Google Scholar
  7. 7.
    Anwar, T., Abulaish, M.: Web content mining for alias identification: a first step towards suspect tracking. In: Proceedings of the IEEE International Conference on ISI, p. 195e7 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Shah & Anchor Kutchhi Engineering CollegeMumbaiIndia

Personalised recommendations