CYBERCRIME ANALYSIS AND INTERPRETATION: A REVIEW

Authors

  • Dikshendra Daulat Sarpate, B. Sankaraiah, B.Rani, Vemula Nikitha, Dr. Syed Umar Author

DOI:

https://doi.org/10.65009/sqkdxy51

Keywords:

INDEX - Cybercrime, Computer Crime, Cyberlaw, Cyber Crimes in India, worms, VIRUS, Hackers etc.,,

Abstract

A survey was conducted to investigate the number of cybercrimes that were committed 
between the introduction of the blue box and the development of hacking-oriented operating systems. 
These operating systems provide novice hackers with the means to learn how to break into a variety of 
software technologies.  At initially, cybercrime was utilized to introduce a large number of viruses and 
worms into the system in order to cause it to malfunction.  Criminals operating online nowadays are 
interested in a variety of items, including but not limited to significant sums of money, extremely sensitive 
data and information, and top-secret files.  In this paper, the evolution of cybercrime since 1970 is 
discussed, and an attempt is made to capture significant cybercrime events that have occurred along the 
way. 
 There are many different types of attacks that fall under the umbrella of cybercrime. Some examples of 
cybercrime include cyber extortion, cyber warfare, the spread of computer viruses or malware, Internet 
fraud, spamming, phishing, carding (fraud), child pornography, and the infringement of intellectual 
property rights.  Due to the increasing number of cyberattacks that are occurring in the modern era, users 
of the internet are required to be aware of these dangers and to exercise caution when conducting business 
conducted online.  The purpose of this study is to investigate the increases in cybercrime that have 
occurred in India as well as the measures that the Indian government has taken to tackle this issue. 
 

,

References

DataReportal. (2024). Internet use in 2024 – Global digital insights. DataReportal.

https://datareportal.com.

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",

International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024,

(23s), 3339–3347.

Statista. (2024). Global internet penetration and user statistics. Statista. Retrieved

fromhttps://www.statista.com.

Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.

(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in

IoT Systems. International Journal of Communication Networks and Information Security

(IJCNIS), 13(3), 582–595.

Usman, M., Zubair, M., Hussein, H. S., Wajid, M., Farrag, M., Ali, S. J., ... & Habeeb, M. S.

(2021). Empirical mode decomposition for analysis and filtering of speech signals. IEEE Canadian

Journal of Electrical and Computer Engineering, 44(3), 343-349.

Prometteur Solutions. (2023). Cyber Attacks in India: A Comprehensive and In-Depth Analysis.

Retrieved fromhttps://www.prometteursolutions.com/blog/cyber-attacks-in

McAfee. (2023). India's Cybercrime Landscape: Key Trends and Emerging Threats. Retrieved

fromhttps://www.mcafee.com/blog/cybercrime-india-2023.

Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm

Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection", International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s),

CyberPeace Foundation. (2022). India's Cybercrime Evolution: Challenges and Countermeasures.

Retrieved fromhttps://www.cyberpeace.org/india-cybercrime.

Press Information Bureau. (2023). Cyber-crime in India: Increasing trends and government

initiatives. Retrievedfrom https://www.pib.gov.in.

RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing

Essay Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention

Mechanisms", Journal of Information Systems Engineering and Management 10 (2), 191-202.

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimized AI Models for Real-Time Cyberattack Detection in Smart Homes and Cities",

International Journal of Applied Engineering & Technology, Vol. 4 No.1, June, 2022.

Cyber Crime Reports. (2023). Analysis of cyber-crime trends in India: 2024 update. Retrieved

fromhttps://www.cybercrimereports.in.

Thakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path

planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning

and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).

Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar,

"Optimized Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization",

International Journal on Recent and Innovation Trends in Computing and Communication, (2023),

(10), 1226–1233.

R. Gnanakumaran, Divya Rohatgi, A K Sampath, Nidhi Nagar, D. Amuthaguka, Raj Kumar

Gupta, "Robust Extreme Learning Machine based Sentiment Analysis and Classification", 2023

th International Conference on Smart Systems and Inventive Technology (ICSSIT), (2023), DOI:

1109/ICSSIT55814.2023.10061017.

Habeeb, M. S., & Babu, T. R. (2024). MS-CFFS: Multistage Coarse and Fine Feature Selection

for Advanced Anomaly Detection in IoT Security Networks. International Journal of Electrical

and Electronics Research, 12(3), 780-790.

K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated

Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze

International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©

Grenze Scientific Society, 2023.

Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.

"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."

Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.

Singh, A., Gupta, M., Raj, A., Gupta, S. K., & Habeeb, M. S. (2020, December). TWDM-PON:

The Enhanced PON for Triple Play Services. In 2020 5th IEEE International Conference on

Recent Advances and Innovations in Engineering (ICRAIE) (pp. 1-5). IEEE.

Downloads.

Published

2025-09-01

How to Cite

CYBERCRIME ANALYSIS AND INTERPRETATION: A REVIEW. (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(3), 115-121. https://doi.org/10.65009/sqkdxy51