Intelligent Data Analytics for Terror Threat Prediction. Группа авторов

Читать онлайн книгу.

Intelligent Data Analytics for Terror Threat Prediction - Группа авторов


Скачать книгу

      In Chapter 12, Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, and Aditya Khamparia present the role of “Attacks & Security Measures in Wireless Sensor Network”. The chapter presents different layer attacks along with security mechanisms to avoid the effect of attack in the network. Security is considered as one of the main constraints in any type of network so it becomes very important to take into consideration the key elements of security which are availability, integrity and confidentiality.

      Hemanta Kumar Bhuyan presents an important discussion and analysis in Chapter 13 on the role of “Large Sensing Data Flows Using Cryptic Techniques”. The chapter discusses the replicated crimes using cyberspace by criminals.

      In Chapter 14, Chandra Sekhar Biswal and Subhendu Kumar Pani present the role of “Cyber-Crime Methodology and its Prevention Techniques”. The chapter places the emphasis on various frauds and cyber-crime happening in India, as well as the different types of cyber-crimes along with the probable solutions for that.

       Dr. Subhendu Kumar Pani

      Department of Computer Science & Engineering, Orissa Engineering College, BPUT, Odisha, India

       Dr. Sanjay Kumar Singh

      Department of Computer Science and Engineering, Indian Institute of Technology Campus, BHU, Varanasi, Indore, India

       Dr. Lalit Garg

      Department of Computer Information Systems at University of Malta, Msida

       Dr. Ram Bilas Pachori

      Department of Electrical Engineering, Indian Institute of Technology Campus, Indore, India

       Dr. Xiaobo Zhang

      School of Automation, Guangdong University of Technology, China

       November 2020

      1

      Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media

       Ravi Kishore Devarapalli* and Anupam Biswas†

       Department of Computer Science Engineering, National Institute of Technology Silchar, Assam, India

       Abstract

      Social media like Facebook, Twitter, WhatsApp, Sina Wiebo, Hike, etc. play an important role in the information spreading in today’s world. Due to large scale connectivity, some of the cyber criminals are choosing these platforms to implement their criminal activities such as rumor spreading which is popularly known as rumor diffusion. In a pluralistic society like India, rumors that spread over various social networking platforms are much more vulnerable. It is challenging for even public, government and technical experts working on social media to find these cyber-crimes and its origin to punish the culprit. Nowadays, some cyber criminals are choosing different platforms and paths to accomplish their plans to escape brilliantly from those activities. Thus automated detection of rumor and tracing its source has great importance.

      Keywords: Rumor, rumor source detection, centrality measures, social networks, diffusion models

      Social media like Facebook, Twitter, Sina Wiebo, YouTube and WhatsApp are becoming major online businesses. Social media uses computer-based technology with internet to ease the sharing of ideas, thoughts, and information by building of virtual networks and communities [1]. Nowadays, social media plays an important role for information diffusion [2]. Social networking sites like Facebook, Twitter, and WhatsApp have become popular over a short period of time with their user-friendly features [3]. It has advantages as well as disadvantages too [4]. Advantages of Information diffusion are, enable users to upload and share photos, videos, comment and like them, without hurting any communities, religions, or political parties, etc. The other side where people may share abusive photos, videos, terror activities or sensitive information about country, which are criminal activities come under cyber-crime.

      Cyber-crime is a criminal activity which involves a computer and internet as part of it [5]. There are many activities that fall under cyber-crime such as passing rumors, online harassment, hacking emails, websites or databases, etc. [6]. To detect whether given data is rumor or fact, use text classification algorithms like Naïve Bayes theorem and support vector machine [7]. These classical algorithms are mainly used for classification purpose, and classify text data based on features and dimensions [8].

      Before going to find rumor source, there is a need of considering factors such as diffusion models, network structure, evaluation metrics and centrality measures [10]. Topology associates with Network structure is in tree or graph, and observation of network example complete observation, snapshot observation, and monitor observation, etc. [11]. If network topology is tree or graph use maximum likelihood (ML) estimator to estimate source [9]. Next factor consider diffusion models to get how fast information diffusing over network [10]. There are four diffusion models namely Susceptible-Infected-Susceptible (SIS), Susceptible-Infected (SI), Susceptible-Infected-Recoverable-Susceptible (SIRS) and Susceptible-Infected-Recoverable (SIR). SI model considers each node in any one of two states susceptible or infected [12]. SIS model considers three states susceptible-infected-susceptible, where infected node can again susceptible in future [13, 14]. SIR model also has three states but susceptible-infected-recovered, where infected node can be recovered by having immune power or taking medicines [15]. SIRS has four states of nodes such as susceptible-infected-recovered-susceptible, where recovered node may be susceptible in future [16]. Another factor consider


Скачать книгу