Abstract
The problem of cybercrime is so serious and costs our society increasingly and significantly. Integrating the cybercrime materials of law enforcement is urgent need for fighting cybercrime internationally. This study proposes a feasible architecture of CybercrimeIR to collect and classify the useful cybercrime materials in investigator’s perspective. In the experiments, this study firstly adopts text representation approaches and machine learning techniques (e.g. support vector machine, Naïve Bayesian, and C4.5) to classify useful cybercrime materials in investigators’ perspective. The performance measure in accuracy can at least achieve to 90% while conducting feature selection with information gain. We believe the proposed architecture of CybercrimeIR is very useful for integrating cybercrime materials of law enforcement globally.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Speer, D.L.: Redefining borders: The challenges of cybercrime. Crime, Law and Social Change 34, 259–273 (2000)
Chung, W., Chen, H., Chang, W., Chou, S.: Fighting cybercrime: a review and the Taiwan experience. Decision Support Systems 41, 669–682 (2006)
Chou, S., Chang, W.: CyberIR – A Technological Approach to Fight Cybercrime. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 32–43. Springer, Heidelberg (2008)
Moraski, L.: Cybercrime Knows No Borders. Infosecurity 8, 20–23 (2011)
Hancock, B.: US Department of Defense Prepares Cybercrime Database. Computers & Security 19, 674 (2000)
EUROPOL: High Tech Crimes with the EU: Threat Assessment 2007 (2007)
Shinder, D.: What makes cybercrime laws so difficult to enforce. IT Security (2011)
Hunton, P.: The growing phenomenon of crime and the internet: A cybercrime execution and analysis model. Computer Law & Security Review 25, 528–535 (2009)
Williams, L.Y.: Catch Me if You Can: A Taxonomically Structured Approach to Cybercrime. The Forum on Public Policy (2008)
Chang, W.: Fighting Cybercrime: A KM Perspective. In: Chen, H., Chau, M., Li, S.-H., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 28–30. Springer, Heidelberg (2010)
Park, H., Cho, S., Kwon, H.-C.: Cyber Forensics Ontology for Cyber Criminal Investigation. In: Sorell, M. (ed.) e-Forensics 2009. LNICST, vol. 8, pp. 160–165. Springer, Heidelberg (2009)
Salton, G.: Automatic information organization and retrieval. McGraw-Hill, New York (1968)
Sebastiani, F.: Machine learning in automated text categorization. ACM Computing Surveys 34, 1–47 (2002)
Meiri, R., Zahavi, J.: Using simulated annealing to optimize the feature selection problem in marketing applications. European Journal of Operational Research 171, 842–858 (2006)
Abbasi, A., Chen, H., Salem, A.: Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums. ACM Transactions on Information Systems 26 (2008)
Schumaker, R.P., Chen, H.: Textual analysis of stock market prediction using breaking financial news: The AZFin text system. ACM Trans. Inf. Syst. 27, 1–19 (2009)
Zhang, Y., Dang, Y., Chen, H., Thurmond, M., Larson, C.: Automatic online news monitoring and classification for syndromic surveillance. Decision Support Systems 47, 508–517 (2009)
Stamatatos, E.: A Survey of Modern Authorship Attribution Methods. Journal of the American Society for Information Science and Technology 60, 538–556 (2009)
Zhang, C.L., Zeng, D., Li, J.X., Wang, F.Y., Zuo, W.L.: Sentiment Analysis of Chinese Documents: From Sentence to Document Level. Journal of the American Society for Information Science and Technology 60, 2474–2487 (2009)
Tolle, K.M., Chen, H.C.: Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science 51, 352–370 (2000)
Dash, M., Liu, H.: Feature selection for classification. Intelligent Data Analysis 1, 131–156 (1997)
Aghdam, M.H., Ghasem-Aghaee, N., Basiri, M.E.: Text feature selection using ant colony optimization. Expert Systems with Applications 36, 6843–6853 (2009)
Yang, Y., Pedersen, J.O.: A Comparative Study on Feature Selection in Text Categorization. In: Proceedings of the Fourteenth International Conference on Machine Learning, pp. 412–420. Morgan Kaufmann Publishers Inc. (1997)
Forman, G.: An extensive empirical study of feature selection metrics for text classification. The Journal of Machine Learning Research 3, 1289–1305 (2003)
Das, S.R., Chen, M.Y.: Yahoo! for Amazon: Sentiment extraction from small talk on the web. Management Science 53, 1375–1388 (2007)
Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology 57, 378–393 (2006)
Vapnik, V.: Statistical learning theory. Wiley (1998)
Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group Web forum messages. IEEE Intelligent Systems 20, 67–75 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, W., Ku, Y., Wu, S., Chiu, C. (2012). CybercrimeIR – A Technological Perspective to Fight Cybercrime. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30428-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-30428-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30427-9
Online ISBN: 978-3-642-30428-6
eBook Packages: Computer ScienceComputer Science (R0)