Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach

被引:0
作者
Amanpreet Singh
Maninder Kaur
机构
[1] Thapar Institute of Engineering and Technology,Department of Computer Science and Engineering
来源
Arabian Journal for Science and Engineering | 2020年 / 45卷
关键词
Machine learning algorithms; Cuckoo search algorithm; Cybercrime; Cyberbullying; Online social networks;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, content-based cybercrime detection has become a topic of attraction among researchers. Cybercrime has emerged as a money-driven industry with malicious intent towards online social networks. Cyber-criminals aim to manipulate vulnerable areas in cyberspace by playing on human understanding and making a profit. They threaten minors, especially adolescents, who are not adequately overseen while online. To address this issue, there is an urgent need for a robust content-based cybercrime detection framework. The aim of this research work is to explore possible combinations of various preprocessing, feature selection and classification methodologies using the cuckoo search metaheuristic approach. This approach seeks to improve the performance of content-based cybercrime detection system. For the purpose of this research, four publicly available datasets for cyberbullying detection have been utilized for evaluating the effectiveness of the proposed algorithm. The algorithm was then further compared with three recent cyberbullying detection models based on various evaluation parameters. These parameters included precision, recall and f-measure. The experimental results demonstrate the effectiveness of the proposed approach. This approach outperformed other recent techniques on all the datasets, giving high predictive recall value via tenfold cross-validation.
引用
收藏
页码:2705 / 2719
页数:14
相关论文
共 73 条
[1]  
Shih YE(2007)Setting the new standard with mobile computing in online learning Int. Rev. Res. Open Distrib. Learn. 8 1-16
[2]  
Cooke M(2008)Web 2.0, social networks and the future of market research Int. J. Mark. Res. 50 267-292
[3]  
Buckley N(2012)Online social networks: a survey of a global phenomenon Comput. Netw. 56 3866-3878
[4]  
Heidemann J(2004)What are cybercrimes? Crim. Justice Matters 58 20-21
[5]  
Klier M(2010)Bullying, cyberbullying, and suicide Arch. Suicide Res. 14 206-221
[6]  
Probst F(2010)Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study Arch. Gen. Psychiatry 67 720-728
[7]  
Wall D(2013)Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying J. Youth Adolesc. 42 739-750
[8]  
Hinduja S(2014)Cuckoo search: recent advances and applications Neural Comput. Appl. 24 169-174
[9]  
Patchin JW(2019)Holistic resource management for sustainable and reliable cloud computing: an innovative solution to global challenge J. Syst. Softw. 155 104-129
[10]  
Sourander A(2012)Common sense reasoning for detection, prevention, and mitigation of cyberbullying ACM Trans. Interact. Intell. Syst. 2 18-443