Machine Learning Models in Detecting Cyber Crimes and Cyber Terrorism in India

Machine Learning Models in Detecting Cyber Crimes and Cyber Terrorism in India

Ravindrababu Jaladanki, Syed Imran Patel, Imran Khan, Karim Ishtiaque Ahmed Mohammed, Thenmozhi M., Arun Kumar Tripathi
DOI: 10.4018/978-1-6684-3942-5.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber-physical systems (CPSs), which are more susceptible to a range of cyber-attacks, play an increasingly crucial role in power system security today. Digital communication has become a global phenomenon in the last decade. Sadly, cyber terrorism is on the rise, and abusers are able to hide behind the anonymity of the internet. A hybrid model for detecting instances of cyber terrorism in Twitter datasets was proposed in this study after a survey of prominent classification algorithms. Logistic regression, linear support vector classifier, and naive bayes are the methods utilised for evaluation. Four metrics were used to evaluate the performance of the classifiers in experiments: precision, F1, accuracy, and recall. The findings show how well each of the algorithms worked, along with the metrics that went along with them. Linear support vector classifier (SVC) was the least effective, while hybrid model (EM) was the most successful.
Chapter Preview
Top

Introduction

Electronic networks and computer technologies are weaponized in cyber terrorism. There must be a terrorist component in order to designate an attack on the Internet as cyber terrorism. There is no comprehensive definition of cyber terrorism, which means that law enforcement, criminal administration, and academicians will be unable to stop the growing threat of cyber terrorism if they don't have a clear understanding of what it is. Technicality, or whether it should be regarded as criminal or technological, is the most challenging part of deciphering cyber terrorism. Barry Collin developed the term 'cyber terrorism' in the late 1980s by combining the two linguistic aspects of cyberspace and terrorism into one word. Barry Collin originated the term “cyber terrorism” in 1997 (Al-Khater, 2020). A cyber-terrorist attack, according to him, is the result of “cybernetics” meeting “terrorism.”

Many notable researchers and organisations have attempted to define and explain what cyber terrorism is, despite the lack of a universally recognised workable explanation. Cyber terrorism has been defined in a variety of ways, including the ones listed below: The National Infrastructure Protection Center (NIPC) defines cyber-terrorism as an act of criminal violence, death, and devastation committed via computers with the intention of influencing government policy (Rawat et al., 2021).

Attacks on Internet businesses can be classified as either cybercrime or cyber terrorism, depending on whether the purpose is purely economic or ideological. A cyber terrorism attack can only be perpetrated by people, groups, or organisations that are unaffiliated with one another (Sivakumar, 2021). International law regulates and punishes all forms of state-sponsored cyber warfare.

When it comes to “cyber terrorism,” Pollitt defines it as “the premeditated political-motivated attack on information systems, computer programmes, and data that result in harm to non-combatant targets by subnational groups or clandestine operations.”

A growing number of people are aware that cyber terrorists are capable of inflicting great harm on the world because of the ever-increasing reliance of modern civilizations on computers and the Internet (Rawat et al., 2021). At the point where the physical and virtual worlds merge, cyber terrorists strike key information infrastructures using ones and zeros. Criminology theory has rarely been used in research on cyber terrorists; instead, academics and government agencies have focused on providing atheoretical descriptions of the problem in the past (Rawat et al., 2011). Cyber terrorists are not a well-known group, nor are cyber terror attacks common or easy to recognise. This presents a significant challenge for academics. Even more difficult to distinguish between cyber terrorism, cybercrime, military-political cyberattacks and international information security is to identify the motivations that separate these concepts (Amir, 2020). Without motivation, it is impossible to legally separate these concepts because one cannot qualify what is happening as a criminal or terrorist act. If the motivations aren't explicitly stated in the applied legal definition, actions of cyber terror may be wrongly categorised (and maybe prosecuted) as cybercrimes.

Complete Chapter List

Search this Book:
Reset