Abstract: Over the past decade, the use of the internet has grown to an astonishing extent. It has dominated almost every field of life and it acts as a channel of communication between various walks of life. However, with an amplified penetration of the internet, cybercrimes have also gained significant impetus. In order to implement their illegal activities and achieve illegal objectives, cybercriminals employ online networking. They use online networking devices to connect with any device of another online user and gain illegal profits in terms of finance, publicity or any other personal motive. The main reason behind such blatant violation of law by these cybercriminals is due to the loopholes and vulnerabilities present in the online system. They conveniently exploit these weak links and breach the privacy of online users. Despite......
[1]. Alami, S., & Elbeqqali, O. (2015). Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog posts. Paper presented at the 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA).
[2]. Bahnsen, A. C., Aouada, D., Stojanovic, A., & Ottersten, B. (2016). Feature engineering strategies for credit card fraud detection. Expert Systems with Applications, 51, 134-142.
[3]. Ch, R., Gadekallu, T. R., Abidi, M. H., & Al-Ahmari, A. (2020). Computational system to classify cyber crime offenses using machine learning. Sustainability, 12(10), 4087.
[4]. Chandrakala, T., Rajini, S. N. S., Dharmarajan, K., & Selvam, K. (2020). Development of crime and fraud prediction using data mining approaches. Technology, 11(12), 1450-1470.
[5]. Chitra, K., & Subashini, B. (2013). Data mining techniques and its applications in banking sector. International Journal of Emerging Technology and Advanced Engineering, 3(8), 219-226.