Autonomous Artificial Intelligence Systems for Fraud Detection and Forensics in Dark Web Environments
DOI:
https://doi.org/10.31449/inf.v46i9.4538Abstract
Artificial Intelligence (AI) influenced technical aspects of research for generating automated intelligent behaviors covering divergent domains but has shown appreciable results when used in cyber forensic technology for crime analysis and detection. AI experts warned about possible security risks associated with algorithms and training data, as AI inherits computing features dealing with IoT-based Smart applications and autonomous transportation, and may be found to be susceptible to vulnerability and threats. The present work discusses models for analyzing terrorists related information and categorizing malicious events by covering the literature review on security risks and AI-related criminality by presenting a taxonomy of criminal behavior and signatures covering tools and criminal targets used in fraudulent activities using AI features by digital forensic techniques. We’ve also shown how AI may make existing crimes more potent, and that new sorts of crimes could emerge that haven't been identified previously. This study has presented a systematic structure for AI crime and dealing strategies. Furthermore, we have proposed AI forensics, a unique strategy for combating AI crime. We discovered that several concepts of DF are still not preferred in AI-based forensics after conducting a comparative examination of forensics.References
D. Jeong, "Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues," IEEE Access, vol. 8, pp. 184560-184574, 2020.
P. Sharma, U. Siddanagaiah and G. & Kul, "Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles," in 2020 IEEE Security and Privacy Workshops (SPW), 2020.
C. Fachkha and M. Debbabi, "Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1197-1227, 2015.
B. Hyman, Z. Alisha and S. Gordon, "Secure controls for smart cities; applications in intelligent transportation systems and smart buildings," International Journal of Science and Engineering Applications, vol. 8, no. 6, pp. 167-171, 2019.
S. A. Ajagbe, M. O. Oyediran, A. Nayyar, J. A. Awokola and J. F. Al-Amri, "P-acohoneybee: a novel load balancer for cloud computing using mathematical approach," Computers, Materials & Continua, vol. 73, no. 1, pp. 1943-1959, 2022.
K. J. Hayward and M. M. Maas, "Artificial intelligence and crime: A primer for criminologists," Crime, Media, Culture, 1741659020917434., 2020.
S. A. Ajagbe, O. A. Oki, O. M. A. and A. Nwanakwaugwu, "Investigating the Efficiency of Deep Learning Models in Bioinspired Object Detection," in 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic., 2022.
R. Rawat and M. Zodape, "URLAD (URL attack detection)-using SVM," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 1, 2012.
J. B. Bernabe and A. Skarmeta, "Introducing the Challenges in Cybersecurity and Privacy-The European Research Landscape," in Challenges in Cybersecurity and Privacy—The European Research Landscape, Rever, 2019, pp. 1-21.
N. Koroniotis, N. Moustafa and E. Sitnikova, "Forensics and deep learning mechanisms for botnets in internet of things: A survey of challenges and solutions," IEEE Access, vol. 7, pp. 61764-61785, 2019.
R. Rawat, N. Patearia and S. Dhariwal, "Key Generator based secured system against SQL-Injection attack," International Journal of Advanced Research in Computer Scienc, vol. 2, no. 5, 2011.
R. Montasari and R. Hill, "Next-generation digital forensics: Challenges and future paradigms," in 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 2019.
I. Bamimore and S. A. Ajagbe, "Design and implementation of smart home nodes for security using radio frequency modules," International Journal of Digital Signals and Smart Systems, vol. 4, no. 4, pp. 286-303, 2020.
D. Nahmias, A. Cohen, N. Nissim and Y. Elovici, "Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments," Neural Networks, vol. 124, pp. 243-257, 2020.
M. Brundage, S. Avin, J. Clark, H. Toner, P. Eckersley, B. Garfinkel and D. Amodei, "The malicious use of artificial intelligence: Forecasting, prevention, and mitigation," arXiv preprint arXiv:1802.07228., 2018.
I. Chomiak-Orsa, A. Rot and B. Blaicke, "Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain," in 12. Chomiak-Orsa, I., Rot, A., & Blaicke, B. (2019, September). Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain. In International Conference on Computational Collective Intelligence, 2019.
M. T. Oladejo and L. Jack, "Fraud prevention and detection in a blockchain technology environment: challenges posed to forensic accountants," International Journal of Economics and Accounting, vol. 9, no. 4, pp. 315-335, 2020.
R. Rawat, B. Garg, K. Pachlasiya, V. Mahor, S. Telang, M. Chouhan and R. Mishra, "SCNTA: monitoring of network availability and activity for identification of anomalies using machine learning approaches," International Journal of of Information Technology and Web Engineering (IJITWE), vol. 17, no. 1, pp. 1-19, 2022.
R. Rawat, V. Mahor, S. Chirgaiya, R. N. Shaw and A. Ghosh, "Sentiment Analysis at Online Social Network for Cyber-Malicious Post Reviews Using Machine Learning Techniques," Computationally Intelligent Systems and their Applications, pp. 113-130, 2021.
K. Pipyros, L. Mitrou, D. Gritzalis and T. Apostolopoulos, "A cyber attack evaluation methodology," in In Proceedings of the 13th European Conference on Cyber Warfare and Security, 2014.
E. Mantas and C. Patsakis, "Who Watches the New Watchmen? The Challenges for Drone Digital Forensics Investigations," arXiv preprint arXiv:2105.10917, 2021.
T. C. King, N. Aggarwal, M. Taddeo and L. Floridi, "Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions," Science and engineering ethics, vol. 26, no. 1, pp. 89-120, 2020.
R. Rawat, V. Mahor, S. Chirgaiya and A. S. Rathore, "Applications of Social Network Analysis to Managing the Investigation of Suspicious Activities in Social Media Platforms," in Advances in Cybersecurity Management , Springer, Cham, 2021, pp. 315-335.
L. Zhang, W. A. N. G. Qing and T. I. A. N. Bin, "Security threats and measures for the cyber-physical systems," The Journal of China Universities of Posts and Telecommunications, vol. 20, pp. 25-29, 2013.
M. Karyda and L. Mitrou, "Internet forensics: Legal and technical issues," in Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007) , 2007.
S. Samtani, M. Kantarcioglu and H. Chen, "Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap.," 23. Samtani, S., Kantarcioglu, M., & Chen, H. (2020). Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap., 2020.
R. Rawat, A. S. Rajawat, V. Mahor, R. N. Shaw and A. Ghosh, "Dark Web—Onion Hidden Service Discovery and Crawling for Profiling Morphing, Unstructured Crime and Vulnerabilities Prediction," in Innovations in Electrical and Electronic Engineering , Springer, Singapore, 2021, pp. 717-734.
S. Papastergiou, H. Mouratidis and E. M. Kalogeraki, "Cyber security incident handling, warning and response system for the european critical information infrastructures (cybersane)," in International Conference on Engineering Applications of Neural Networks , 2019.
M. Elyas, A. Ahmad, S. B. Maynard and A. Lonie, "Digital forensic readiness: Expert perspectives on a theoretical framework," Computers & Security, vol. 52, pp. 70-89, 2015.
I. A. K. Tuhin, P. Loh and Z. Wang, "Smart Cybercrime Classification for Digital Forensics with Small Datasets," in Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, 2022.
M. Rasmi and K. E. Al-Qawasmi, "Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis," International Journal of Security and Its Applications, vol. 10, no. 5, pp. 297-308, 2016.
K. Rajendiran, K. Kannan and Y. Yu, "Applications of machine learning in cyber forensics.," in Confluence of AI, Machine, and Deep Learning in Cyber Forensics , IGI Global, 2021, pp. 29-46.
E. E. D. Hemdan and D. H. Manjaiah, "Digital investigation of cybercrimes based on big data analytics using deep learning," in Deep Learning and Neural Networks: Concepts, Methodologies, Tools, and Applications , IGI Global, 2020, pp. 615-632.
A. Wang and X. Gao, "A variable scale case-based reasoning method for evidence location in digital forensics," Future Generation Computer Systems, vol. 221, pp. 209-219, 2021.
B. K. Mohanta, D. Jena, U. Satapathy and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Internet of Things, vol. 11, p. 100227, 2020.
J. Kietzmann, J. Paschen and E. Treen, "Artificial intelligence in advertising: How marketers can leverage artificial intelligence along the consumer journey," 29. Kietzmann, J., Paschen, J., & Treen, E. (2018). Artificial intelligence in advertising: How marketers can leverage artificial intelligence along the consumer journey. Journal of Advertising Research, vol. 58, no. 3, pp. 263-267, 2018.
R. Chesney and D. Citron, "Deep fakes and the new disinformation war: The coming age of post-truth geopolitics," Foreign Affairs, vol. 98, p. 147, 2019.
S. Dhariwal, R. Rawat and N. Patearia, "C-Queued Technique against SQL injection attack," International Journal of Advanced Research in Computer Science, vol. 5, no. 2, 2011.
A. S. Rajawat, R. Rawat, K. Barhanpurkar, R. N. Shaw and A. Ghosh, "Vulnerability Analysis at Industrial Internet of Things Platform on Dark Web Network Using Computational Intelligence," Computationally Intelligent Systems and their Applications, pp. 39-51, 2021.
N. Kaloudi and J. Li, "The ai-based cyber threat landscape: A survey.," ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1-34, 2020.
B. Mittelstadt, C. Russell and S. Wachter, "Explaining explanations in AI.," in Proceedings of the conference on fairness, accountability, and transparency, 2019.
R. B. M. J. &. B. C. Zeid, "Zeid, R. B.; Moubarak, J.; Bassil, C.," in 2020 International Wireless Communications and Mobile Computing (IWCMC), 2020.
Y. Y. Ke, T. T. Peng, T. K. Yeh, W. Z. Huang, S. E. Chang, S. H. Wu and C. T. ... Chen, "Artificial intelligence approach fighting COVID-19 with repurposing drugs," Biomedical Journal, vol. 43, no. 4, pp. 355-362, 2020.
M. U. Scherer, "Regulating artificial intelligence systems: Risks, challenges, competencies, and strategies," Harv. JL & Technology, vol. 29, p. 353, 2015.
P. Svenmarck, L. Luotsinen, M. Nilsson and J. Schubert, "Possibilities and challenges for artificial intelligence in military applications," in Proceedings of the NATO Big Data and Artificial Intelligence for Military Decision Making Specialists' meeting, Neuilly-sur-Seine France, 2018.
S. Jafarnejad, L. Codeca, W. Bronzi, R. Frank and T. Engel, "December). A car hacking experiment: When connectivity meets vulnerability," in 2015 IEEE globecom workshops (GC Wkshps), 2015.
F. Martinelli, F. Mercaldo, V. Nardone and A. Santone, "Car hacking identification through fuzzy logic algorithms," in 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE), 2017.
D. Song, K. Eykholt, I. Evtimov, E. Fernandes, B. Li and A. .. K. T. Rahmati, "Physical adversarial examples for object detectors," in 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)., 2018.
I. J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples," arXiv preprint arXiv:1412.6572, 2014.
E. Raff and C. Nicholas, "Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash," Digital Investigation, vol. 24, pp. 34-49, 2018.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika