CYBERCRIME ANALYSIS AND INTERPRETATION: A REVIEW
DOI:
https://doi.org/10.65009/sqkdxy51Keywords:
INDEX - Cybercrime, Computer Crime, Cyberlaw, Cyber Crimes in India, worms, VIRUS, Hackers etc.,,Abstract
A survey was conducted to investigate the number of cybercrimes that were committed
between the introduction of the blue box and the development of hacking-oriented operating systems.
These operating systems provide novice hackers with the means to learn how to break into a variety of
software technologies. At initially, cybercrime was utilized to introduce a large number of viruses and
worms into the system in order to cause it to malfunction. Criminals operating online nowadays are
interested in a variety of items, including but not limited to significant sums of money, extremely sensitive
data and information, and top-secret files. In this paper, the evolution of cybercrime since 1970 is
discussed, and an attempt is made to capture significant cybercrime events that have occurred along the
way.
There are many different types of attacks that fall under the umbrella of cybercrime. Some examples of
cybercrime include cyber extortion, cyber warfare, the spread of computer viruses or malware, Internet
fraud, spamming, phishing, carding (fraud), child pornography, and the infringement of intellectual
property rights. Due to the increasing number of cyberattacks that are occurring in the modern era, users
of the internet are required to be aware of these dangers and to exercise caution when conducting business
conducted online. The purpose of this study is to investigate the increases in cybercrime that have
occurred in India as well as the measures that the Indian government has taken to tackle this issue.
References
DataReportal. (2024). Internet use in 2024 – Global digital insights. DataReportal.
Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",
International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024,
(23s), 3339–3347.
Statista. (2024). Global internet penetration and user statistics. Statista. Retrieved
Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.
(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in
IoT Systems. International Journal of Communication Networks and Information Security
(IJCNIS), 13(3), 582–595.
Usman, M., Zubair, M., Hussein, H. S., Wajid, M., Farrag, M., Ali, S. J., ... & Habeeb, M. S.
(2021). Empirical mode decomposition for analysis and filtering of speech signals. IEEE Canadian
Journal of Electrical and Computer Engineering, 44(3), 343-349.
Prometteur Solutions. (2023). Cyber Attacks in India: A Comprehensive and In-Depth Analysis.
Retrieved fromhttps://www.prometteursolutions.com/blog/cyber-attacks-in
McAfee. (2023). India's Cybercrime Landscape: Key Trends and Emerging Threats. Retrieved
fromhttps://www.mcafee.com/blog/cybercrime-india-2023.
Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm
Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection", International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s),
CyberPeace Foundation. (2022). India's Cybercrime Evolution: Challenges and Countermeasures.
Retrieved fromhttps://www.cyberpeace.org/india-cybercrime.
Press Information Bureau. (2023). Cyber-crime in India: Increasing trends and government
initiatives. Retrievedfrom https://www.pib.gov.in.
RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing
Essay Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention
Mechanisms", Journal of Information Systems Engineering and Management 10 (2), 191-202.
Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Optimized AI Models for Real-Time Cyberattack Detection in Smart Homes and Cities",
International Journal of Applied Engineering & Technology, Vol. 4 No.1, June, 2022.
Cyber Crime Reports. (2023). Analysis of cyber-crime trends in India: 2024 update. Retrieved
fromhttps://www.cybercrimereports.in.
Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path
planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning
and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).
Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar,
"Optimized Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization",
International Journal on Recent and Innovation Trends in Computing and Communication, (2023),
(10), 1226–1233.
R. Gnanakumaran, Divya Rohatgi, A K Sampath, Nidhi Nagar, D. Amuthaguka, Raj Kumar
Gupta, "Robust Extreme Learning Machine based Sentiment Analysis and Classification", 2023
th International Conference on Smart Systems and Inventive Technology (ICSSIT), (2023), DOI:
1109/ICSSIT55814.2023.10061017.
Habeeb, M. S., & Babu, T. R. (2024). MS-CFFS: Multistage Coarse and Fine Feature Selection
for Advanced Anomaly Detection in IoT Security Networks. International Journal of Electrical
and Electronics Research, 12(3), 780-790.
K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated
Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze
International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©
Grenze Scientific Society, 2023.
Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.
"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."
Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.
Singh, A., Gupta, M., Raj, A., Gupta, S. K., & Habeeb, M. S. (2020, December). TWDM-PON:
The Enhanced PON for Triple Play Services. In 2020 5th IEEE International Conference on
Recent Advances and Innovations in Engineering (ICRAIE) (pp. 1-5). IEEE.

