INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 8 NO. 2 2022
DOI: https://doi.org/10.56201/ijcsmt.v8.no2.2022.pg56.63


Monitoring Suspicious Discussions on Online Forum Using Deep Learning Techniques

O.J Afolabi and A.A. Waheed


Abstract


Nowadays, people are passionate about using the internet in their daily lives, and this has resulted in the rapidly increasing adoption and use of online forums. An online forum can be defined as a medium to share one's thoughts, feelings and emotions towards specific multimedia artefacts such as pictures, videos and paintings etc. However, the use of online forums has leads to the execution of many illegal activities such as trading of black market money online, distributing copyrighted movies, as well as using illegal words. Therefore, Law enforcement needs a system to effectively deal with this problem. An example of such system include the Network Intrusion Detection System (NIDS) that assists system administrators detect network security vulnerabilities in their organization. On the other, many challenges arise when developing a flexible and effective NIDS for unplanned and unpredictable attacks. This paper proposes a deep learning-based approach to develop a flexible and efficient NIDS to analyze suspicious and criminal activities occurring in online forums. The proposed system combined a variety of Deep learning techniques and Natural Language Processing (NLP) for suspicious keyword extraction as well as Support Vector Machine (SVM) for detection and classification of suspicious keywords. We present the performance of our approach and compare it with some previous works. The metrics to be compared include accuracy, precision, recall, and f-measure values. This research improves system performance and security compared to existing systems.


keywords:

Online forum; machine learning; deep learning; natural language processing; support vector machine


References:


1. F. Gandhi, D. Pansaniya & S. Naik, Ethical Hacking: Types of Hackers, Cyber
Attacks and Security. International Research Journal of Innovations in Engineering and
Technology, 6(1), 2022, p.28.
2. L.Á. Almeida, Data Model Classification Based On Machine Learning Techniques for
Detection of Anomalous Traffic. Cartagena de Indias, 2019.
3. T. Dam, L.D. Klausner, D. Buhov & S. Schrittwieser, Large-Scale Analysis of Pop-
Up Scam On Typosquatting Urls. Proceedings of the 14th International Conference on
Availability, Reliability and Security, 2019, (pp. 1-9).
4. J.W. Messerschmidt, From Marx to Bonger: Socialist Writings On Women, Gender,
And Crime. Sociological Inquiry, 58(4), 1988, pp.378-392.
5. J. Young, Working-Class Criminology. Critical Criminology (Routledge Revivals),
2013, (pp. 79-110). Routledge.
6. H. Lee & K.S. Choi, Interrelationship Between Bitcoin, Ransomware, And Terrorist
Activities: Criminal Opportunity Assessment Via Cyber-Routine Activities Theoretical
Framework. Victims & Offenders, 16(3), 2021, pp.363-384.
7. R.A. Berk, Artificial Intelligence, Predictive Policing, And Risk Assessment for Law
Enforcement. Annual Review of Criminology, 4, 2021, pp.209-237.


DOWNLOAD PDF

Back