Autonomous Artificial Intelligence Systems for Fraud Detection and Forensics in Dark Web Environments

Romil Rawat, Olukayode Oki, Rajesh Kumar Chakrawarti, Temitope Samson Adekunle, Jose Manappattukunnel Lukose, Sunday Adeola Ajagbe

Abstract


Artificial Intelligence (AI) influenced technical aspects of research for generating automated intelligent behaviors covering divergent domains but has shown appreciable results when used in cyber forensic technology for crime analysis and detection. AI experts warned about possible security risks associated with algorithms and training data, as AI inherits computing features dealing with IoT-based Smart applications and autonomous transportation, and may be found to be susceptible to vulnerability and threats. The present work discusses models for analyzing terrorists related information and categorizing malicious events by covering the literature review on security risks and AI-related criminality by presenting a taxonomy of criminal behavior and signatures covering tools and criminal targets used in fraudulent activities using AI features by digital forensic techniques. We’ve also shown how AI may make existing crimes more potent, and that new sorts of crimes could emerge that haven't been identified previously. This study has presented a systematic structure for AI crime and dealing strategies. Furthermore, we have proposed AI forensics, a unique strategy for combating AI crime. We discovered that several concepts of DF are still not preferred in AI-based forensics after conducting a comparative examination of forensics.

 


Full Text:

PDF

References


D. Jeong, "Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and Open Issues," IEEE Access, vol. 8, pp. 184560-184574, 2020.

P. Sharma, U. Siddanagaiah and G. & Kul, "Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles," in 2020 IEEE Security and Privacy Workshops (SPW), 2020.

C. Fachkha and M. Debbabi, "Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1197-1227, 2015.

B. Hyman, Z. Alisha and S. Gordon, "Secure controls for smart cities; applications in intelligent transportation systems and smart buildings," International Journal of Science and Engineering Applications, vol. 8, no. 6, pp. 167-171, 2019.

S. A. Ajagbe, M. O. Oyediran, A. Nayyar, J. A. Awokola and J. F. Al-Amri, "P-acohoneybee: a novel load balancer for cloud computing using mathematical approach," Computers, Materials & Continua, vol. 73, no. 1, pp. 1943-1959, 2022.

K. J. Hayward and M. M. Maas, "Artificial intelligence and crime: A primer for criminologists," Crime, Media, Culture, 1741659020917434., 2020.

S. A. Ajagbe, O. A. Oki, O. M. A. and A. Nwanakwaugwu, "Investigating the Efficiency of Deep Learning Models in Bioinspired Object Detection," in 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic., 2022.

R. Rawat and M. Zodape, "URLAD (URL attack detection)-using SVM," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 1, 2012.

J. B. Bernabe and A. Skarmeta, "Introducing the Challenges in Cybersecurity and Privacy-The European Research Landscape," in Challenges in Cybersecurity and Privacy—The European Research Landscape, Rever, 2019, pp. 1-21.

N. Koroniotis, N. Moustafa and E. Sitnikova, "Forensics and deep learning mechanisms for botnets in internet of things: A survey of challenges and solutions," IEEE Access, vol. 7, pp. 61764-61785, 2019.

R. Rawat, N. Patearia and S. Dhariwal, "Key Generator based secured system against SQL-Injection attack," International Journal of Advanced Research in Computer Scienc, vol. 2, no. 5, 2011.

R. Montasari and R. Hill, "Next-generation digital forensics: Challenges and future paradigms," in 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 2019.

I. Bamimore and S. A. Ajagbe, "Design and implementation of smart home nodes for security using radio frequency modules," International Journal of Digital Signals and Smart Systems, vol. 4, no. 4, pp. 286-303, 2020.

D. Nahmias, A. Cohen, N. Nissim and Y. Elovici, "Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments," Neural Networks, vol. 124, pp. 243-257, 2020.

M. Brundage, S. Avin, J. Clark, H. Toner, P. Eckersley, B. Garfinkel and D. Amodei, "The malicious use of artificial intelligence: Forecasting, prevention, and mitigation," arXiv preprint arXiv:1802.07228., 2018.

I. Chomiak-Orsa, A. Rot and B. Blaicke, "Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain," in 12. Chomiak-Orsa, I., Rot, A., & Blaicke, B. (2019, September). Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain. In International Conference on Computational Collective Intelligence, 2019.

M. T. Oladejo and L. Jack, "Fraud prevention and detection in a blockchain technology environment: challenges posed to forensic accountants," International Journal of Economics and Accounting, vol. 9, no. 4, pp. 315-335, 2020.

R. Rawat, B. Garg, K. Pachlasiya, V. Mahor, S. Telang, M. Chouhan and R. Mishra, "SCNTA: monitoring of network availability and activity for identification of anomalies using machine learning approaches," International Journal of of Information Technology and Web Engineering (IJITWE), vol. 17, no. 1, pp. 1-19, 2022.

R. Rawat, V. Mahor, S. Chirgaiya, R. N. Shaw and A. Ghosh, "Sentiment Analysis at Online Social Network for Cyber-Malicious Post Reviews Using Machine Learning Techniques," Computationally Intelligent Systems and their Applications, pp. 113-130, 2021.

K. Pipyros, L. Mitrou, D. Gritzalis and T. Apostolopoulos, "A cyber attack evaluation methodology," in In Proceedings of the 13th European Conference on Cyber Warfare and Security, 2014.

E. Mantas and C. Patsakis, "Who Watches the New Watchmen? The Challenges for Drone Digital Forensics Investigations," arXiv preprint arXiv:2105.10917, 2021.

T. C. King, N. Aggarwal, M. Taddeo and L. Floridi, "Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions," Science and engineering ethics, vol. 26, no. 1, pp. 89-120, 2020.

R. Rawat, V. Mahor, S. Chirgaiya and A. S. Rathore, "Applications of Social Network Analysis to Managing the Investigation of Suspicious Activities in Social Media Platforms," in Advances in Cybersecurity Management , Springer, Cham, 2021, pp. 315-335.

L. Zhang, W. A. N. G. Qing and T. I. A. N. Bin, "Security threats and measures for the cyber-physical systems," The Journal of China Universities of Posts and Telecommunications, vol. 20, pp. 25-29, 2013.

M. Karyda and L. Mitrou, "Internet forensics: Legal and technical issues," in Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007) , 2007.

S. Samtani, M. Kantarcioglu and H. Chen, "Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap.," 23. Samtani, S., Kantarcioglu, M., & Chen, H. (2020). Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap., 2020.

R. Rawat, A. S. Rajawat, V. Mahor, R. N. Shaw and A. Ghosh, "Dark Web—Onion Hidden Service Discovery and Crawling for Profiling Morphing, Unstructured Crime and Vulnerabilities Prediction," in Innovations in Electrical and Electronic Engineering , Springer, Singapore, 2021, pp. 717-734.

S. Papastergiou, H. Mouratidis and E. M. Kalogeraki, "Cyber security incident handling, warning and response system for the european critical information infrastructures (cybersane)," in International Conference on Engineering Applications of Neural Networks , 2019.

M. Elyas, A. Ahmad, S. B. Maynard and A. Lonie, "Digital forensic readiness: Expert perspectives on a theoretical framework," Computers & Security, vol. 52, pp. 70-89, 2015.

I. A. K. Tuhin, P. Loh and Z. Wang, "Smart Cybercrime Classification for Digital Forensics with Small Datasets," in Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, 2022.

M. Rasmi and K. E. Al-Qawasmi, "Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis," International Journal of Security and Its Applications, vol. 10, no. 5, pp. 297-308, 2016.

K. Rajendiran, K. Kannan and Y. Yu, "Applications of machine learning in cyber forensics.," in Confluence of AI, Machine, and Deep Learning in Cyber Forensics , IGI Global, 2021, pp. 29-46.

E. E. D. Hemdan and D. H. Manjaiah, "Digital investigation of cybercrimes based on big data analytics using deep learning," in Deep Learning and Neural Networks: Concepts, Methodologies, Tools, and Applications , IGI Global, 2020, pp. 615-632.

A. Wang and X. Gao, "A variable scale case-based reasoning method for evidence location in digital forensics," Future Generation Computer Systems, vol. 221, pp. 209-219, 2021.

B. K. Mohanta, D. Jena, U. Satapathy and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Internet of Things, vol. 11, p. 100227, 2020.

J. Kietzmann, J. Paschen and E. Treen, "Artificial intelligence in advertising: How marketers can leverage artificial intelligence along the consumer journey," 29. Kietzmann, J., Paschen, J., & Treen, E. (2018). Artificial intelligence in advertising: How marketers can leverage artificial intelligence along the consumer journey. Journal of Advertising Research, vol. 58, no. 3, pp. 263-267, 2018.

R. Chesney and D. Citron, "Deep fakes and the new disinformation war: The coming age of post-truth geopolitics," Foreign Affairs, vol. 98, p. 147, 2019.

S. Dhariwal, R. Rawat and N. Patearia, "C-Queued Technique against SQL injection attack," International Journal of Advanced Research in Computer Science, vol. 5, no. 2, 2011.

A. S. Rajawat, R. Rawat, K. Barhanpurkar, R. N. Shaw and A. Ghosh, "Vulnerability Analysis at Industrial Internet of Things Platform on Dark Web Network Using Computational Intelligence," Computationally Intelligent Systems and their Applications, pp. 39-51, 2021.

N. Kaloudi and J. Li, "The ai-based cyber threat landscape: A survey.," ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1-34, 2020.

B. Mittelstadt, C. Russell and S. Wachter, "Explaining explanations in AI.," in Proceedings of the conference on fairness, accountability, and transparency, 2019.

R. B. M. J. &. B. C. Zeid, "Zeid, R. B.; Moubarak, J.; Bassil, C.," in 2020 International Wireless Communications and Mobile Computing (IWCMC), 2020.

Y. Y. Ke, T. T. Peng, T. K. Yeh, W. Z. Huang, S. E. Chang, S. H. Wu and C. T. ... Chen, "Artificial intelligence approach fighting COVID-19 with repurposing drugs," Biomedical Journal, vol. 43, no. 4, pp. 355-362, 2020.

M. U. Scherer, "Regulating artificial intelligence systems: Risks, challenges, competencies, and strategies," Harv. JL & Technology, vol. 29, p. 353, 2015.

P. Svenmarck, L. Luotsinen, M. Nilsson and J. Schubert, "Possibilities and challenges for artificial intelligence in military applications," in Proceedings of the NATO Big Data and Artificial Intelligence for Military Decision Making Specialists' meeting, Neuilly-sur-Seine France, 2018.

S. Jafarnejad, L. Codeca, W. Bronzi, R. Frank and T. Engel, "December). A car hacking experiment: When connectivity meets vulnerability," in 2015 IEEE globecom workshops (GC Wkshps), 2015.

F. Martinelli, F. Mercaldo, V. Nardone and A. Santone, "Car hacking identification through fuzzy logic algorithms," in 2017 IEEE international conference on fuzzy systems (FUZZ-IEEE), 2017.

D. Song, K. Eykholt, I. Evtimov, E. Fernandes, B. Li and A. .. K. T. Rahmati, "Physical adversarial examples for object detectors," in 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)., 2018.

I. J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples," arXiv preprint arXiv:1412.6572, 2014.

E. Raff and C. Nicholas, "Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash," Digital Investigation, vol. 24, pp. 34-49, 2018.




DOI: https://doi.org/10.31449/inf.v46i9.4538

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.