Skip to main content

CybercrimeIR – A Technological Perspective to Fight Cybercrime

  • Conference paper
Intelligence and Security Informatics (PAISI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7299))

Included in the following conference series:

Abstract

The problem of cybercrime is so serious and costs our society increasingly and significantly. Integrating the cybercrime materials of law enforcement is urgent need for fighting cybercrime internationally. This study proposes a feasible architecture of CybercrimeIR to collect and classify the useful cybercrime materials in investigator’s perspective. In the experiments, this study firstly adopts text representation approaches and machine learning techniques (e.g. support vector machine, Naïve Bayesian, and C4.5) to classify useful cybercrime materials in investigators’ perspective. The performance measure in accuracy can at least achieve to 90% while conducting feature selection with information gain. We believe the proposed architecture of CybercrimeIR is very useful for integrating cybercrime materials of law enforcement globally.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Speer, D.L.: Redefining borders: The challenges of cybercrime. Crime, Law and Social Change 34, 259–273 (2000)

    Article  Google Scholar 

  2. Chung, W., Chen, H., Chang, W., Chou, S.: Fighting cybercrime: a review and the Taiwan experience. Decision Support Systems 41, 669–682 (2006)

    Article  Google Scholar 

  3. Chou, S., Chang, W.: CyberIR – A Technological Approach to Fight Cybercrime. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 32–43. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Moraski, L.: Cybercrime Knows No Borders. Infosecurity 8, 20–23 (2011)

    Article  Google Scholar 

  5. Hancock, B.: US Department of Defense Prepares Cybercrime Database. Computers & Security 19, 674 (2000)

    Google Scholar 

  6. EUROPOL: High Tech Crimes with the EU: Threat Assessment 2007 (2007)

    Google Scholar 

  7. Shinder, D.: What makes cybercrime laws so difficult to enforce. IT Security (2011)

    Google Scholar 

  8. Hunton, P.: The growing phenomenon of crime and the internet: A cybercrime execution and analysis model. Computer Law & Security Review 25, 528–535 (2009)

    Article  Google Scholar 

  9. Williams, L.Y.: Catch Me if You Can: A Taxonomically Structured Approach to Cybercrime. The Forum on Public Policy (2008)

    Google Scholar 

  10. Chang, W.: Fighting Cybercrime: A KM Perspective. In: Chen, H., Chau, M., Li, S.-H., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 28–30. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Park, H., Cho, S., Kwon, H.-C.: Cyber Forensics Ontology for Cyber Criminal Investigation. In: Sorell, M. (ed.) e-Forensics 2009. LNICST, vol. 8, pp. 160–165. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Salton, G.: Automatic information organization and retrieval. McGraw-Hill, New York (1968)

    Google Scholar 

  13. Sebastiani, F.: Machine learning in automated text categorization. ACM Computing Surveys 34, 1–47 (2002)

    Article  MathSciNet  Google Scholar 

  14. Meiri, R., Zahavi, J.: Using simulated annealing to optimize the feature selection problem in marketing applications. European Journal of Operational Research 171, 842–858 (2006)

    Article  MATH  Google Scholar 

  15. Abbasi, A., Chen, H., Salem, A.: Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums. ACM Transactions on Information Systems 26 (2008)

    Google Scholar 

  16. Schumaker, R.P., Chen, H.: Textual analysis of stock market prediction using breaking financial news: The AZFin text system. ACM Trans. Inf. Syst. 27, 1–19 (2009)

    Article  Google Scholar 

  17. Zhang, Y., Dang, Y., Chen, H., Thurmond, M., Larson, C.: Automatic online news monitoring and classification for syndromic surveillance. Decision Support Systems 47, 508–517 (2009)

    Article  Google Scholar 

  18. Stamatatos, E.: A Survey of Modern Authorship Attribution Methods. Journal of the American Society for Information Science and Technology 60, 538–556 (2009)

    Article  Google Scholar 

  19. Zhang, C.L., Zeng, D., Li, J.X., Wang, F.Y., Zuo, W.L.: Sentiment Analysis of Chinese Documents: From Sentence to Document Level. Journal of the American Society for Information Science and Technology 60, 2474–2487 (2009)

    Article  Google Scholar 

  20. Tolle, K.M., Chen, H.C.: Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science 51, 352–370 (2000)

    Article  Google Scholar 

  21. Dash, M., Liu, H.: Feature selection for classification. Intelligent Data Analysis 1, 131–156 (1997)

    Article  Google Scholar 

  22. Aghdam, M.H., Ghasem-Aghaee, N., Basiri, M.E.: Text feature selection using ant colony optimization. Expert Systems with Applications 36, 6843–6853 (2009)

    Article  Google Scholar 

  23. Yang, Y., Pedersen, J.O.: A Comparative Study on Feature Selection in Text Categorization. In: Proceedings of the Fourteenth International Conference on Machine Learning, pp. 412–420. Morgan Kaufmann Publishers Inc. (1997)

    Google Scholar 

  24. Forman, G.: An extensive empirical study of feature selection metrics for text classification. The Journal of Machine Learning Research 3, 1289–1305 (2003)

    MATH  Google Scholar 

  25. Das, S.R., Chen, M.Y.: Yahoo! for Amazon: Sentiment extraction from small talk on the web. Management Science 53, 1375–1388 (2007)

    Article  Google Scholar 

  26. Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology 57, 378–393 (2006)

    Article  Google Scholar 

  27. Vapnik, V.: Statistical learning theory. Wiley (1998)

    Google Scholar 

  28. Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group Web forum messages. IEEE Intelligent Systems 20, 67–75 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, W., Ku, Y., Wu, S., Chiu, C. (2012). CybercrimeIR – A Technological Perspective to Fight Cybercrime. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30428-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30428-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30427-9

  • Online ISBN: 978-3-642-30428-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics