Cybercrime Detection Using Semi-Supervised Neural Network

被引:0
作者
Karimi, Abbas [1 ]
Abbasabadei, Saber [1 ]
Torkestani, Javad Akbari [1 ]
Zarafshan, Faraneh [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Arak Branch, Arak, Markazi Provien, Iran
关键词
cybercrime; intrusion detection; neural network; semi-supervised classification; INTRUSION DETECTION; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, artificial intelligence is widely used in various fields and industries. Cybercrime is a concern of these days, and artificial intelligence is used to detect this type of crime. Crime detection systems generally detect the crime by training from the related data over a period of time, but sometimes some samples in a dataset may have no label. Therefore, in this paper, a method based on semi-supervised neural network is presented regarding crime types detection. As the neural network is a supervised classification system, therefore, this paper presents a pseudo-label method for neural network optimization and develops it to semi-supervised classification. In the proposed method, firstly the dataset is divided into two sections, labelled and unlabelled, and then the trained section is used to estimate the labelling of the unlabelled samples based on pseudo-labels. The results indicate that the proposed method improves the accuracy, Precision and Recall up to 99.83%, 99.83% and 99.83%, respectively.
引用
收藏
页码:155 / 183
页数:29
相关论文
共 55 条
[1]   Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic [J].
Abdulhammed, Razan ;
Faezipour, Miad ;
Abuzneid, Abdelshakour ;
AbuMallouh, Arafat .
IEEE SENSORS LETTERS, 2019, 3 (01)
[2]  
Al-Zoubi AM, 2017, INT CONF INFORM COMM, P130, DOI 10.1109/IACS.2017.7921959
[3]   Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model [J].
Aljawarneh, Shadi ;
Aldwairi, Monther ;
Yassein, Muneer Bani .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :152-160
[4]   A Survey of Random Forest Based Methods for Intrusion Detection Systems [J].
Alves Resende, Paulo Angelo ;
Drummond, Andre Costa .
ACM COMPUTING SURVEYS, 2018, 51 (03)
[5]  
Batista L. O., 2019, ARXIV190102868CSAI
[6]   The ANNS approach to DEM reconstruction [J].
Buscema, Paolo Massimo ;
Massini, Giulia ;
Fabrizi, Marco ;
Breda, Marco ;
Della Torre, Francesca .
COMPUTATIONAL INTELLIGENCE, 2018, 34 (01) :310-344
[7]   Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes [J].
Caneppele, Stefano ;
Aebi, Marcelo F. .
POLICING-A JOURNAL OF POLICY AND PRACTICE, 2019, 13 (01) :66-79
[8]   Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime [J].
Chang, Lennon Y. C. ;
Zhong, Lena Y. ;
Grabosky, Peter N. .
REGULATION & GOVERNANCE, 2018, 12 (01) :101-114
[9]  
Chauhan C, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P21, DOI 10.1109/CCAA.2017.8229823
[10]  
da Silva I.N., 2017, Artificial Neural Networks