Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

An Optimization Technique for Mining Cybercriminal Network from Online Social Media

Author : Parvathy.G 1 Bindhu J S 2

Date of Publication :7th February 2016

Abstract: Data mining is the process of collecting data from different context and summarizes them into useful information. Data mining can be used to determine the relationship between internal factors and external factors .It allows the users to analyze, categorize and determines the relationships inferred in them. Text mining usually referred to as text data mining can be used be used to extract information from text. Text mining can be used in information retrieval, pattern recognition and data mining techniques. The introduction of social media and social networks has not only changed the opportunities available for us but also we need to be beware about the threats. Recent researches show that the number of crimes are increasing through online social media and they may cause tremendous loss to organizations. Existing cyber technologies are not effective to protect organizations .Existing mining methods concentrate on lexicons in which they can identify only a limited number of relations. Here a genetic algorithm approach is introduced in which latent concepts can be extracted. Genetic Algorithm is a linear search which requires only little information from large search area.. Then these concepts are subjected to extract the semantics which infers the corresponding relationships. Genetic algorithm provides a better solution in which accuracy and time efficiency can be improved. The main contribution of the paper shows that they identify the corresponding cybercriminal networks.

Reference :

    1. R.Xia, C.Zong, X.Hu and E.Cambria,Feature ensemble plus samples selection:A comprehensive approach to domain adaptation for sentiment classification ,IEEE Intell .Syst.,vol 28,no.3,pp.10-18,2013
    2. R.Li,S.Bao,J.Wang,Y.Yu and Y.Cao, Cominer: An effective algorithm for mining competitors from the web, Data Mining, in Proc.Int. Conf. Data Mining,2006,pp. 948- 952
    3. D.Rajagopal, D.Olsher, E.Cambria and K. Kwok(2013): Commonsense topic modeling In Proc.ACM Int. Conf.Knowledge Discovery Data mining, Chicago
    4. Sangno Lee, Jeff Baker,Jaeki Song : An empirical comparison of four text mining methods Proceedings of the 43rd Hawaii International Conference on System Sciences 2010
    5. A. Sidorova, N. Evangelopoulos, J. Valacich and T. Ramakrishnan, Uncovering the intellectual core of the information systems discipline, MIS Quarterly, 32 (2008), pp. 467-482
    6. Lingfeng Niu ,Yong Shi :Semi-Supervised PLSA for Document Clustering:2010 International Conference On Data Mining Workshops
    7. M Blie and M.I Jordan(2003): Latent Dirichlet Allocation.J.Mach.Learn Res,993-1022
    8. S. Geman and D. Geman, Stochastic relaxation, Gibbs distributions, and the Bayesian relation of images, IEEE Trans. Pattern Anal. Mach. Intell., vol. 6, no. 6, pp. 721741, 1984
    9. Mining Social Network Data for Cyber Physical System: Manjushree Gokhale, Bhushan Barde, Ajinkya Bhuse, Sonali Kaklij: (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015, 1490-1492
    10. D.Maynard,V.Tablan and C.Ursu,(2001): Name enitity Recognition from diverse text types, In Proc,Conf.Recent Advances Natural Language processing.
    11. S.X .Wu and W.Banzhaf,The use of computational intelligence in intrusion detection systems:A review. Appl.Soft.Comput.,vol 10. No.1.pp.1-35,2010
    12. Y.Xia,W.Su,R.Y.K.Lau and Y.Lie,Discovery latent commercial networks from online financial news article, Enterprise inform.Syst.,vol 7,no.3,pp.303-331,2013
    13. Chris H.Q.Ding A Similarity Based Probability Model for Latent Semantic IndexingProc Of 22nd ACM SIGIR99 Conference, pp.59-65
    14. R. Y. K. Lau, D. Song, Y. Li, C. H. Cheung, and J. X. Hao, Towards a fuzzy domain ontology extraction method for adaptive e-learning, IEEE Trans. Knowl. Data Eng., vol. 21, no. 6, pp. 800813, 2009.
    15. Y. Song, S. Pan, S. Liu, M. X. Zhou, and W. Qian, Topic and keyword re-ranking for LDA-based topic modeling, in Proc. 18th ACM Conf. Information Knowledge Management, 2009, pp. 17571760.
    16. J.Y.Nie,G.Cao and J.Bai,Inferential language models for information retrieval,ACM Trans .Asian Lang.Inf.Process.,vol 5,no.4,pp.296-322,2006
    17. Dynamic Social Network Analysis of a DarkNetwork: Identifying Significant Facilitators, Siddharth Kaza, Daning Hu, and Hsinchun Chen, Fellow, IEEE
    18. Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering: Mikhail Belkin and Partha Niyog

Recent Article