Machine Learning Approach to Mobile Forensics Framework for Cyber Crime Detection in Nigeria

Ibrahim Goni (Department of Computer science, Adamwa state University Mubi, Nigeria)
Murtala Mohammad (Department of Computer science, Adamwa state University Mubi, Nigeria)

Article ID: 2147

Abstract


The mobile Cyber Crime detection is challenged by number of mobile devices (internet of things), large and complex data, the size, the velocity, the nature and the complexity of the data and devices has become so high that data mining techniques are no more efficient since they cannot handle Big Data and internet of things. The aim of this research work was to develop a mobile forensics framework for cybercrime detection using machine learning approach. It started when call was detected and this detection is made by machine learning algorithm furthermore intelligent mass media towers and satellite that was proposed in this work has the ability to classified calls whether is a threat or not and send signal directly to Nigerian communication commission (NCC) forensic lab for necessary action.


Keywords


Cyber crime; Machine learning; NCC Mobile forensics

Full Text:

PDF

References


[1] S. Shahzad. Protecting the integrity of digital evidence and basic human rights during the process of digital forensics. Ph.D. thesis Stockholm University, 2015.

[2] A. Abdalzim M., Amin B. A. M. a survey on mobile forensics for android smart phones IOSR Journal of computer engineering, 2015, 17(2): 15-19.

[3] M. Nickson K., Victor R.K., Venter H. Divergence deep learning cognitive computing techniques into cyber forensics Elservier Forensics Science international synergy 1, 2019, 61-67.

[4] A. Rukayat, Charles O. U., Florence A. O. computer forensics guidelines: a requirement for testing cybercrime in Nigeria now? 2017.

[5] E. Casey. Editorial-A sea change in digital forensics and incident response. Digital investigation evidence Elsevier Ltd 17, A1-A2, 2016.

[6] S, Ehsan, Giti J. Seminars in proactive artificial intelligence for cyber security consulting and research, Systematic cybernetics and informatics, 2019, 17(1): 297-305.

[7] Bandar Almaslukh, Forensics analysis using text clustering in the age of large volume data: a review. International journal of advanced computer and application, 2019, 10(6): 72-76.

[8] Al-Jadir I., Wong K. W., Fing C.C., Xie H. Enhancing digital forensics analysis using memetic algorithm feature selection method for document clustering 2018 IEEE international conference on systems, Man and cybernetics, 2018: 3673-3678.

[9] Suid B., Preeti B. Application of artificial intelligence in cyber security. International journal of engineering research in computer science and engineering, 2018, 5(4): 214-219.

[10] O. David A., Goodness O., Etecte M.A. Unbated cyber terrorism and huma security in Nigeria. Asian social science, 2019, 15(11): 105-115.

[11] April. Threat start-SMS spam volume by month of each region SC magazine, 2014. Available online at: http//www.scmagazine.com/april-2014-threat-stats/ slideshowz

[12] Apruzze G., Colajanni M. F., Ferreti L., Marchett M. on the effectiveness of machine learning for cyber security in 2018 IEEE international conference on cyber conflict, 2018, 371-390 .

[13] Buckza A. L., Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection IEEE communication survey and totorials, 2016, 18(2): 1153-1176

[14] Biswas S.K. intrusion detection using machine learning: A comparison study. International Journal of pure and applied mathematics, 2018 118(19): 101- 114

[15] Y. Xin, Kong L., Liu Z., Chen Y., Zhu H., Gao M., Hou H., Wang C. Machine learning and deep learning methods for cyber security. IEEE Access, 2018, 6: 35365-35381.

[16] N. Miloseivic, Denghantanh A., Choo K.K.R. Machine learning aided android malware classification. Computer and electrical engineering, 2017, 61: 266- 274.

[17] B. Geluvaraj, Stawik P.M., Kumar T. A. the future of cyber security: the major role of Artificial intelligence, Machine learning and deep learning in cyber space. International conference on computer network and communication technologies Springer Singapore, 2019, 739-747.

[18] H. Mohammed B., Vinaykumar R., Soman K. P. A short review on applications of deep learning for cyber security. 2018.

[19] M. Rege, Mbah R. B. K. Machine learning for cyber defense and attack. in the 7th International conference on data analysis, 2018, 73-78.

[20] D. Ding, Hang Q. L., Xing Y., Ge X., Zhang X. M. A survey on security control and attack detection for industrial cyber physical system. Neuro-computing. 2018, 275. 1674-1683.

[21] D. Berman S., Buczak A.L., Chavis J. S., Corbelt C.L. A survey of deep learning methods for cyber security information, 2018, 10(4).

[22] Y. Wang, Ye Z., Wan P., Zhao J. A survey of dynamic spectrum allocation based on reinforcement learning algorithms in cognitive radio network. Artificial intelligence review. 2019, 51(3): 413-506.

[23] A. Abubakar, Paranggono B. Machine learning based intrusion detection system for software defined networks. 7th International conference on Emerging security techniques IEEE. 2017, 138-143.

[24] S.Jose, Malathi D., Reddy B., Jayaseeli D. A survey on anomaly based host intrusion detection system. Journal of physics. Conference series, 2018, 1000(1).

[25] S. Dey, Ye Q., Sampalli S. A Machine learning based intrusion detection scheme for data fusion in mobile cloud involving heterogeneous clients network. Information fussion, 2019, 49: 205-215.

[26] P. Deshpande, Sharma S.C., Peddoju S.K., Junaid S. HIDS: a host based intrusion detection system for cloud computing environment. International journal of system assuarance engineering and management. 2018, 9(3): 567-576.

[27] M. Nobakht, Sivaraman V., Boreli R. A host-Based Intrusion detection and mitigation framework for smart IoT using open flow in 11th International conference on availability reliability and security IEEE. 2016, 147-156.

[28] A. Meshram, Christian H. Anomaly detection in industrial networks using machine learning: A road map. Machine learning for cyber physical system Springer Berlin Heldelberg. 2017, 65-72.

[29] R. Devakunchari, Souraba, Prakhar M. A study of cyber security using machine learning techniques. International journal of innovative technology and exploring engineering, 2019, 8(7): 183-186.

[30] E. Alison N. FLUF: fuzzy logic utility framework to support computer network defense decision making IEEE. 2016.

[31] A. Taylor, Leblanc S., Japkowicz N. Anomaly detection in auto-mobile control network data with long short term memory network in data science and advance analytics. IEEE international conference, 2016, 130-139.

[32] O. Amosov S., Ivan Y.S., Amosovo S.G. Recognition of abnormal traffic using deep neural networks and fuzzy logic. International Multi-conference on industrial engineering and modern technologies IEEE. 2019.

[33] M. Gyun L. Artificial Intelligence for development series: Report on AI and IoT in Security Aspect. 2018.

[34] L. Matt. Rise of machine: machine learning & its cybersecurity applications, NCC group white paper, 2017.

[35] National cyber security center UK, www.ncsc.gov.uk

[36] A. Nuril, Supriyanto. Forensic Authentication of WhatsApp Messenger Using the Information Retrieval Approach. International Journal of Cyber Security and Digital Forensics (IJCSDF), 2019, 8(3): 206-212.

[37] A Marfianto, I Riadi. WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method. International Journal of Cyber Security and Digital Forensics (IJCSDF), 2018, 7(3): 319-327.

[38] N Anwar, I. Riadi. Forensic Investigative Analysis of WhatsApp Messenger Smartphone Against WhatsApp Web-Based, Journal Information Technology Electromagnetic Computing and Information, 2017, 3(1): 1-10.

[39] S. Ikhsani, C. Hidayanto, Whatsapp and LINE Messenger Forensic Analysis with Strong and Valid Evidence in Indonesia. Tek. ITS, 2016, 5(2): 728-736.

[40] M. Ashawa, S. Morris. Analysis of Android Malware Detection Techniques: A Systematic Review. International Journal of Cyber Security and Digital Forensics (IJCSDF), 2019, 8(3): 177-187.

[41] W. Songyang, Wang, P., Zhang, Y. Effective detection of android malware based on the usage of data flow APIs and machine learning: Information and Software Technology, 2016, 75: 17-25.

[42] Anastasia, S., Gamayunov, D.: Review of the mobile malware detection approaches: Parallel, Distributed and Network-Based Processing (PDP). In: Proc. IEEE 23rd Euro micro International Conference, 2015: 600-603.

[43] D. Anusha, Troia, F. D., Visaggio, C. A., Austin, T. H., Stamp, M.: A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques, 2017, 13(1): 1-12.

[44] S. Morgan. Cyber security Business Report, 2017. Retrieved from CSO: https://www.csoonline.com/article/3237674/ransomware/ransomware-damage-costs-predicted-to-hit115b-b y-2019.html

[45] R. Collier. NHS Ransomware attack spreads worldwide. CMAJ, 2017, 189(22), 786-787. https://doi.org/10.1503/cmaj.1095434

[46] H. Trisnasenjaya, I. Riadi Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework. International Journal of Cyber Security and Digital Forensics (IJCSDF), 2019, 8(1): 89-97.

[47] H. Parag Rughani. Artificial Intelligence Based Digital Forensics Framework. International Journal of Advanced Research in Computer Science, 2017, 8(8): 10-14.

[48] Current State of Cybercrime, RSA Whitepaper, 2016.

[49] World Internet Users and 2017 Population Stats, accessed from: http://http://www.internetworldstats.com/stats.html

[50] R. Mark. Computer forensics: Basics. Lecture note Purdue University, 2004.

[51] LightReading. AT&T’s Gilbert: AI Critical to 5G Infrastructure. September, 2018.

[52] I. Goni, Ahmed L. Propose Neuro-Fuzzy-Genetic Intrusion Detection System. International Journal of Computer Applications, 2015, 115(8): 1-5.

[53] Y. Harel, Irad Ben Gal, and Yuval Elovici. Cyber security and the role of intelligent systems in addressing its challenges. ACM Transaction on Intelligent System Technology, 2017, 8(4): 1-12.



DOI: https://doi.org/10.30564/jcsr.v2i4.2147

Refbacks

  • There are currently no refbacks.
Copyright © 2020 Author(s)


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.