DEVELOPMENT OF AN EFFECTIVE SYSTEM FOR DETECTING CYBERCRIMES USING MODIFIED RIPPLE DOWN RULE SYSTEM AND NEURAL NETWORK.

  • DAMILARE GIDEON AMUSAN LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY, OGBOMOSO
  • A.S FALOHUN LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY, OGBOMOSO
  • O. T ARULOGUN LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY, OGBOMOSO
Keywords: Cybercrime, Modified Ripple Down Rule, Radial basis Function, Credit Card, (key words)

Abstract

Cybercrime is an unlawful act in which computer is the tools to commit an offense; cyber criminals perform operation in cyber space with the help of the internet. Most existing techniques used in detecting cybercrimes could detect individual attacks but failed in terms of coordinated and distributed attacks. Also, most of the detection system used to curb cybercrimes on web application generates a large number of false alarms. Hence, this research developed an enhanced system which could not only detect individual, coordinated and distributed attacks but also reduce the number of false alarms. The research data for this work which consists of six cards (labeled A, B, C, D, E and F) were sourced from an online shopping store. The six cards contain four attributes with associated two thousand seven hundred (2700) transactions. The number of transactions carried out through each card were 200, 300, 400, 500, 600 and 700 respectively. Sixty percent of transactions carried out on each card were used to train the system while the remaining forty percent were used to test the system. The acquired attributes through each card were used as inputs in developing the system. Radial basis function was used for features extraction and the extracted features were moved to the Modified Ripple Down Rule engine that compared the profiling of the cardholder transaction information. The developed system was implemented on Matrix laboratory environment. The performance of the developed system was evaluated at 0.80 threshold using Sensitivity, Specificity, False Alarm Rate, Accuracy and Computational Time.

Downloads

Download data is not yet available.

Author Biographies

A.S FALOHUN, LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY, OGBOMOSO

Falohun A. S. is a Professor in the Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. He graduated with B.Tech. Computer Engineering (…..) from LadokeAkintola University of Technology, Ogbomoso, Nigeria. He obtained M.Tech Computer Science from Ladoke Akintola University of Technology (….) and Ph.D Computer Science from Ladoke Akintola University of Technology (….). As an erudite  scholar,  he  has  published  reputable  journals  and  scholarlistic  articles  in  referred  journals  and  learned conferences. His research interests includes Intelligent security Systems, Character &Pattern Recognition, Data and Information Security. He belongs to the following professional bodies: Full member, The Nigerian Society of Engineers (NSE); International Association of Engineer (IAE); Registered Engineer, Council for the Regulation of Engineering in Nigeria (COREN. He can be reached through this email:  [email protected] .

 

O. T ARULOGUN, LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY, OGBOMOSO

Arulogun  O. T. is a Professor in the Department of Computer Science and Engineering, LadokeAkintola University of Technology, Ogbomoso, Nigeria and he is the current Director of LAUTECH Open and Distance Learning Center, Ogbomoso. He graduated with B.Tech. Computer Engineering (1998) from LadokeAkintola University of Technology, Ogbomoso, Nigeria. He obtained M.Sc. Microprocessor and Control Engineering from University of Ibadan, Nigeria (2004) and Ph.D Computer Science from Ladoke Akintola University of Technology (2008). As an erudite  scholar,  he  has  published  reputable  journals  and  scholarlistic  articles  in  referred  journals  and  learned conferences. His research interests include: Intelligent systems and their applications. Typical application areas include intelligent sensors for fault diagnosis (electronic noses), security and computer vision. He belongs to the following professional bodies: Full member, Computer Professionals (Registration) Council of Nigeria (MCPN); Registered Engineer, Council for the Regulation of Engineering in Nigeria (COREN). He can be reached through this email: [email protected]

References

. J. O. Odumesi, “A socio-technological analysis of cybercrime and cyber security in Nigeria”., International Journal of Sociology and Anthropology, Vol.6, Issue 3, pp.116-125. 2014

. D. Sumanjit, and N. Tapaswini, “Impact of Cyber Crime: Issues and Challenges”. International Journal of Engineering Sciences & Emerging Technologies, Vol. 6, Issue 2, pp. 142-153, 2013

. P. Adeyemi, and A. Nkechi, “Research on Intrusion Detection and Response: A Survey”. International Journal of Network Security, Vol.2, pp. 84-102, 2016

. U. B. Steve, O. Diepreye and D. A. Uduak, “Information Communication Technologies in the Management of Education for Sustainable Development in Africa.” An International Multi-Disciplinary Journal, Ethiopia, Vol. 3, Issue 3, pp. 414-428, 2009

. O. Maitanmi, S. Ogunlere, S. Ayinde and Y. Adekunle. “Impact of Cyber Crimes on Nigerian Economy”. The International Journal Of Engineering And Science (IJES) Vol.2, Issue. 4, pp. 45-51, 2013

. A. Patcha and J .M. Park . “An overview of anomaly detection techniques: Existing solutions and latest technological trends”. Computer Networks,Vol. 51, pp. 3448-3470, 2007

. G. Gianini, M. Anisetti, V. Azzini, V. Bellandi, E. Damiani and S. Marrara. “ An Artificial Immune System approach to Anomaly Detection in Multimedia Ambient Intelligence“. 3rd IEEE International Conference on Digital Ecosystems and Technologies. Pp. 502 – 506, 2009

. O. O. Ogundile, “Fraud Analysis in Nigeria’s Mobile Telecommunication Industry”, International Journal of Scientific and Research Publications, Vol. 3, Issue 2, ISSN 2250- 3153, 2013

. M. A. Lebbe, J. I. Agbinya, Z. Chaczko and F. Chiang, “Self-Organized Classification of Dangers for Secure Wireless Mesh Networks”, Australasian Telecommunication Networks and Applications Conference. pp. 322 – 327, 2007

. A. Srivastava, Kundu.A, Sural.S and Maju-mdar. A.K, “Credit Card Fraud Detection Using Hidden Markov Model”, IEEE Transactions on Dependable & Secure Computing Vol. 5, 2008.

. S. Panigrahi, A. Kundun, S. Sural and A.K. Majum-dar, “Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning” Science Direct, pp. 354-363, 2009.

. E. Duman and H.M. Ozcelik., “Detecting credit card fraud by genetic algorithm and scatter search”, Science Direct, Expert System with Applications. Vol.38 , pp 13057- 13063, 2011

. H. Farvaresh and M.M. Sepehri, “A data mining framework for detecting subscription fraud in telecommunication”, Science Direct, Engineering Applications of Artificial Intelligence. Vol.24, pp. 182-194, 2010.

. K. Kim, Y. Choi and J. Park. “Pricing fraud detection in online shopping malls using a finite mixture model”. Science Direct Electronic Commerce Research and Applications, pp. 195-207, 2013

. M. A. Lebbe, J. I. Agbinya, Z. Chaczko, and F. Chiang . “Self-Organized Classification of Dangers for Secure Wireless Mesh Networks”, Australasian Telecommunication Networks and Applications Conference. Ppp. 322 – 327, 2007

. S. Wu and S. Wang, “Information-Theoretic Outlier Detection for Large-Scale Categorical Data”, IEEE Vol. 25 Issue..3, 2013

. Y. Sahin, S. Bulkan.and E. Duman., “A cost-sensitive decision tree approach for fraud detection”, Science Direct, Expert System with Applications. Vol. 40, pp-5916- 5923, 2013.

. A. Zhang, C. Chen and H. Karimi. “A new adaptive LSSVR with on-line multikernel RBF tuning to evaluate analog circuit performance”. Abstract and Applied Analysis.Vol. 20, pp. 1-7. Article ID 231735, 2013

. V.Mareeswari, Dr G. Gunasekaran, “Prevention of Credit Card Fraud Detection based on HSVM”, International Conference on Information Communication and Embedded System 2016.

. S. M. Jaba, P. Soumyashree, and K. M. Ashis, “A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 2, 2013.

. IC. Yeh, and C. Lien, “The comparisons of data mining techniques for the predictive accuracy of probability of defualt of credit card client,” Expert Syetem with Applications Vol. 36, pp.2473-2480, 2008

Published
2023-05-09
How to Cite
AMUSAN, D. G., FALOHUN, A. S., & ARULOGUN, O. T. (2023). DEVELOPMENT OF AN EFFECTIVE SYSTEM FOR DETECTING CYBERCRIMES USING MODIFIED RIPPLE DOWN RULE SYSTEM AND NEURAL NETWORK. IJRDO -Journal of Computer Science Engineering, 9(5), 1-7. https://doi.org/10.53555/cse.v9i5.5663