Recent Advancements in Machine Learning For Cybercrime Prediction
- URL: http://arxiv.org/abs/2304.04819v2
- Date: Mon, 9 Oct 2023 16:24:26 GMT
- Title: Recent Advancements in Machine Learning For Cybercrime Prediction
- Authors: Lavanya Elluri, Varun Mandalapu, Piyush Vyas, Nirmalya Roy
- Abstract summary: This paper aims to comprehensively survey the latest advancements in cybercrime prediction.
We reviewed more than 150 research articles and discussed 50 most recent and appropriate ones.
This paper presents a holistic view of cutting-edge developments and publicly available datasets.
- Score: 2.38324507743994
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cybercrime is a growing threat to organizations and individuals worldwide,
with criminals using sophisticated techniques to breach security systems and
steal sensitive data. This paper aims to comprehensively survey the latest
advancements in cybercrime prediction, highlighting the relevant research. For
this purpose, we reviewed more than 150 research articles and discussed 50 most
recent and appropriate ones. We start the review with some standard methods
cybercriminals use and then focus on the latest machine and deep learning
techniques, which detect anomalous behavior and identify potential threats. We
also discuss transfer learning, which allows models trained on one dataset to
be adapted for use on another dataset. We then focus on active and
reinforcement learning as part of early-stage algorithmic research in
cybercrime prediction. Finally, we discuss critical innovations, research gaps,
and future research opportunities in Cybercrime prediction. This paper presents
a holistic view of cutting-edge developments and publicly available datasets.
Related papers
- Model Inversion Attacks: A Survey of Approaches and Countermeasures [59.986922963781]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.
Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.
This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - Verification of Machine Unlearning is Fragile [48.71651033308842]
We introduce two novel adversarial unlearning processes capable of circumventing both types of verification strategies.
This study highlights the vulnerabilities and limitations in machine unlearning verification, paving the way for further research into the safety of machine unlearning.
arXiv Detail & Related papers (2024-08-01T21:37:10Z) - To Change Or To Stick: Unveiling The Consistency Of Cyber Criminal Signatures Through Statistical Analysis [0.0]
This study unveils the elusive presence of criminal signatures in cyberspace, validating for the first time their existence through statistical evidence.
Our findings verify the existence of unique signatures associated with advanced cybercriminals, bridging a crucial gap in current understanding of human behavior in cyber-attacks.
arXiv Detail & Related papers (2024-08-01T12:08:40Z) - A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks [42.3024294376025]
Machine unlearning is a research hotspot in the field of privacy protection.
Recent researchers have found potential privacy leakages of various of machine unlearning approaches.
We analyze privacy risks in various aspects, including definitions, implementation methods, and real-world applications.
arXiv Detail & Related papers (2024-06-10T11:31:04Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Crime Prediction Using Machine Learning and Deep Learning: A Systematic
Review and Future Directions [2.624902795082451]
This review paper examines over 150 articles to explore the various machine learning and deep learning algorithms applied to predict crime.
The study provides access to the datasets used for crime prediction by researchers.
The paper highlights potential gaps and future directions that can enhance the accuracy of crime prediction.
arXiv Detail & Related papers (2023-03-28T21:07:42Z) - A Survey of Machine Unlearning [56.017968863854186]
Recent regulations now require that, on request, private information about a user must be removed from computer systems.
ML models often remember' the old data.
Recent works on machine unlearning have not been able to completely solve the problem.
arXiv Detail & Related papers (2022-09-06T08:51:53Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.