Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Web Crime Mining by Means of Data Mining Techniques

1Javad Hosseinkhani, 1Suhaimi Ibrahim, 1Suriayati Chuprat and 2Javid Hosseinkhani Naniz
1Advanced Informatics School (AIS), Universiti Technologi Malaysia (UTM), Kuala Lumpur, Malaysia
2Department of Computer Engineering, Islamic Azad University, Kerman Branch, Kerman, Iran
Research Journal of Applied Sciences, Engineering and Technology  2014  10:2027-2032
http://dx.doi.org/10.19026/rjaset.7.495  |  © The Author(s) 2014
Received: June 22, 2013  |  Accepted: July 08, 2013  |  Published: March 15, 2014

Abstract

The purpose of this study is to provide a review to mining useful information by means of Data Mining. The procedure of extracting knowledge and information from large set of data is data mining that applying artificial intelligence method to find unseen relationships of data. There is more study on data mining applications that attracted more researcher attention and one of the crucial field is criminology that applying in data mining which is utilized for identifying crime characteristics. Detecting and exploring crimes and investigating their relationship with criminals are involved in the analyzing crime process. Criminology is a suitable field for using data mining techniques that shows the high volume and the complexity of relationships between crime datasets. Therefore, for further analysis development, the identifying crime characteristic will be the first step and obtained knowledge from data mining approaches is a very useful tool to help and support police forces. This research aims to provide a review to extract useful information by means of Data Mining, in order to find crime hot spots out and predict crime trends for them using crime data mining techniques.

Keywords:

Crime data mining techniques, forensics analysis, web crime mining, web mining,


References

  1. Agrawal, R. and R. Srikant, 1995. Mining sequentiel motifs. Proceeding of the 11th Intrnational Conference on Data Engineering.
  2. Agrawal, R., T. Imielinski and A.N. Swami, 1993. Mining association rules between sets of items in large databases. Proceedings of the ACM SIGMOD International Conference on Management of Data.
    CrossRef    
  3. Baldi, P., P. Frasconi and P. Smyth, 2003. Modeling the Internet and the Web: Probabilistic Methods and Algorithms, Wiley, Chichester.
  4. Bing, L., 2007. Web Data Mining: Exploring Hyperlinks, Contents and Usage Data. Springer Verlag, NY.
  5. Chau, M., J.J. Xu and H. Chen, 2007. Extracting meaningful entities from police narrative reports. Proceeding of the National Conference on Digital Government Research. Digital Government Research Center, pp: 271-275.
  6. Che, D., K. Aberer and Y. Chen, 1999. The design of query interfaces to the GPCRDB biological database. Proceedings of the User Interfaces to Data Intensive Systems.
    CrossRef    
  7. Djeraba, C.O., R. Zaiane and S. Simoff, 2007. Mining Multimedia and Complex Data. Springer, New York.
  8. Duda, R.O., P.E. Hart and D.G. Stork, 2001. Pattern Classification. 2nd Edn., John Wiley and Sons Inc., New York.
  9. Fayyad, U.M. and R. Uthurusamy, 2002. Evolving data into mining solutions for insights. Commun. ACM Evol. Data Min. Solut. Insights, 45(8): 28-31.
    CrossRef    
  10. Gray, A., P. Sallis and S. MacDonell, 1997. Software forensics: Extending authorship analysis techniques to computer programs. Proceeding of the 3rd Biannual Conference International Association Forensic Linguistics. International Association of Forensic Linguistics, pp: 1-8.
  11. Han, J. and M. Kamber, 2009. Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco.
  12. Han, J. and M. Kamber, 2010. Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco.
  13. Hauck, R.V., H. Atabakhsb, P. Ongvasith and H. Gupta, 2002. Using coplink to analyze criminal-justice data. Computer, 35(3): 30-37.
    CrossRef    
  14. Hosseinkhani, J., S. Chuprat and H. Taherdoost, 2012a. Criminal network mining by web structure and content mining. Proceeding of the 11th WSEAS International Conference on Information Security and Privacy (ISP '12). Prague, Czech Republic, September 24-26.
  15. Hosseinkhani, J., S. Chuprat, H. Taherdoost and S.M. Amin, 2012b. Propose a framework for criminal mining by web structure and content mining. Int. J. Adv. Comp. Sci. Info. Technol., 1(1): 1-13.
  16. Hosseinkhani, J., H. Taherdoost and S. Chuprat, 2013. Discovering criminal networks by web structure mining. Proceeding of the 7th International Conference on Computing and Convergence Technology. Seoul, South Korea, December 3-5 (In Press).
  17. Jain, A.K., M.N. Murty and P.J. Flynn, 1999. Data clustering: A review. ACM Comput. Surv., 31(3): 264-323.
    CrossRef    
  18. Kargupta, H., K. Liu and J. Ryan, 2003. Privacy-sensitive distributed data mining from multi-party data. Proceeding of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics. LNCS 2665, Springer-Verlag, pp: 336-342.
    CrossRef    
  19. Keyvanpour, M., M. Javideh and M. Ebrahimi, 2011. Detecting and investigating crime by means of data mining: A general crime matching framework. Proc. Comput. Sci., 3(2011): 872-880.
    CrossRef    
  20. Kumar, M., A. Gupta and S. Saha, 2009. Approach to adaptive user interfaces using interactive media systems. Proceedings of the 11th International Conference on Intelligent User Interfaces.
  21. Lee, W., S.J. Stolfo and W. Mok, 1999. A data mining framework for building intrusion detection models. Proceeding of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA, pp: 120-132.
  22. Levenshtein, V.L., 1966. Binary codes capable of correcting deletions, insertions and reversals. Soviet Phys. Doklady, 10: 707-710.
  23. Newsome, M., C. Pancake and J. Hanus, 1997. HyperSQL: Web-based query interfaces for biological databases. Proceedings of the 13th Hawaii International Conference on System Sciences.
    CrossRef    
  24. Perner, P., 2003. Data Mining on Multimedia Data. Springer, New York.
    CrossRef    
  25. Senator, T., H. Goldberg, J. Wooton, A. Cottini, A. Umar, C. Klinger, W. Llamas, M. Marrone and R. Wong, 1995. The FinCEN artificial intelligence system: Identifying potential money laundering from reports of large cash transactions. AI Mag., 16(4): 21-39.
  26. Vel, O. de., A. Anderson, M. Corney and G. Mohay, 2001. Mining e-mail content for author identification forensics. SIGMOD Record, 30(4): 55-64.
    CrossRef    
  27. Wang, G., H. Chen and H. Atabakhsh, 2004. Automatically detecting deceptive criminal identities. Commun. ACM, 47(3): 70-76.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved