Recent Advancements in Machine Learning For Cybercrime Prediction
- URL: http://arxiv.org/abs/2304.04819v2
- Date: Mon, 9 Oct 2023 16:24:26 GMT
- Title: Recent Advancements in Machine Learning For Cybercrime Prediction
- Authors: Lavanya Elluri, Varun Mandalapu, Piyush Vyas, Nirmalya Roy
- Abstract summary: This paper aims to comprehensively survey the latest advancements in cybercrime prediction.
We reviewed more than 150 research articles and discussed 50 most recent and appropriate ones.
This paper presents a holistic view of cutting-edge developments and publicly available datasets.
- Score: 2.38324507743994
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cybercrime is a growing threat to organizations and individuals worldwide,
with criminals using sophisticated techniques to breach security systems and
steal sensitive data. This paper aims to comprehensively survey the latest
advancements in cybercrime prediction, highlighting the relevant research. For
this purpose, we reviewed more than 150 research articles and discussed 50 most
recent and appropriate ones. We start the review with some standard methods
cybercriminals use and then focus on the latest machine and deep learning
techniques, which detect anomalous behavior and identify potential threats. We
also discuss transfer learning, which allows models trained on one dataset to
be adapted for use on another dataset. We then focus on active and
reinforcement learning as part of early-stage algorithmic research in
cybercrime prediction. Finally, we discuss critical innovations, research gaps,
and future research opportunities in Cybercrime prediction. This paper presents
a holistic view of cutting-edge developments and publicly available datasets.
Related papers
- A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks [42.3024294376025]
Machine unlearning is a research hotspot in the field of privacy protection.
Recent researchers have found potential privacy leakages of various of machine unlearning approaches.
We analyze privacy risks in various aspects, including definitions, implementation methods, and real-world applications.
arXiv Detail & Related papers (2024-06-10T11:31:04Z) - On Responsible Machine Learning Datasets with Fairness, Privacy, and
Regulatory Norms [58.93352076927003]
There have been severe concerns over the trustworthiness of AI technologies.
Machine and deep learning algorithms depend heavily on the data used during their development.
We propose a framework to evaluate the datasets through a responsible rubric.
arXiv Detail & Related papers (2023-10-24T14:01:53Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Crime Prediction Using Machine Learning and Deep Learning: A Systematic
Review and Future Directions [2.624902795082451]
This review paper examines over 150 articles to explore the various machine learning and deep learning algorithms applied to predict crime.
The study provides access to the datasets used for crime prediction by researchers.
The paper highlights potential gaps and future directions that can enhance the accuracy of crime prediction.
arXiv Detail & Related papers (2023-03-28T21:07:42Z) - Generating Cyber Threat Intelligence to Discover Potential Security
Threats Using Classification and Topic Modeling [6.0897744845912865]
Cyber Threat Intelligence (CTI) has been represented as one of the proactive and robust mechanisms.
Our goal is to identify and explore relevant CTI from hacker forums by using different supervised and unsupervised learning techniques.
arXiv Detail & Related papers (2021-08-16T02:30:29Z) - Threat of Adversarial Attacks on Deep Learning in Computer Vision:
Survey II [86.51135909513047]
Deep Learning is vulnerable to adversarial attacks that can manipulate its predictions.
This article reviews the contributions made by the computer vision community in adversarial attacks on deep learning.
It provides definitions of technical terminologies for non-experts in this domain.
arXiv Detail & Related papers (2021-08-01T08:54:47Z) - Detecting Cross-Modal Inconsistency to Defend Against Neural Fake News [57.9843300852526]
We introduce the more realistic and challenging task of defending against machine-generated news that also includes images and captions.
To identify the possible weaknesses that adversaries can exploit, we create a NeuralNews dataset composed of 4 different types of generated articles.
In addition to the valuable insights gleaned from our user study experiments, we provide a relatively effective approach based on detecting visual-semantic inconsistencies.
arXiv Detail & Related papers (2020-09-16T14:13:15Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.