i-manager's Journal on Digital Forensics & Cyber Security (JDF)


Volume 1 Issue 2 July - December 2023

Research Paper

Bi-Modal Email Spam Detection using Recurrent and Convolution Neural Network Techniques

Bashir Sulaimon Adebayo* , Olawale Surajudeen Adebayo**, Kehinde Lawal***, Muhammad Abdullahi****
* Robert Gordon University, Aberdeen, Scotland, United Kingdom.
** Department of Computer Science, International Islamic University, Malaysia.
*** Department of Computer Science, Ladoke Akintola University of Technology, Ogbomoso.
**** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
Bashir, S., Adebayo, O. S., Lawal, K., and Abdullahi, M. (2023). Bi-Modal Email Spam Detection using Recurrent and Convolution Neural Network Techniques. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 1-11. https://doi.org/10.26634/jdf.1.2.19761

Abstract

The increasing adoption of electronic emails as a means of communication, both at the commercial, government, and individual levels, serves as an impetus for attackers to compromise communication. Consequently, numerous machine learning techniques have been developed for identifying unwanted emails, commonly known as spam. Despite the significant progress reported in existing literature, most studies do not integrate the detection of both textual and image-based spam. In this paper, two deep learning techniques that detect both textual and image-based spam were evaluated. First, the Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN) is studied, training them on various textimage features to explore their effectiveness on an improved dataset. Subsequently, in an effort to outsmart current spam detection techniques, a bi-modal architecture capable of detecting textual spam, image spam, and mixed spam is designed. The experimental results in conjunction with existing transfer learning for effective spam detection is provided.

Research Paper

Credit Card Fraud Detection System

Ernest Makombe* , Fanny Chatola**, Pradeep J.***, G. Glorindal****
*-**** DMI-St. John the Baptist University, Malawi.
Makombe, E., Chatola, F., Pradeep, J., and Glorindal, G. (2023). Credit Card Fraud Detection System. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 12-19. https://doi.org/10.26634/jdf.1.2.20064

Abstract

Credit card fraud is a significant problem for financial institutions and cardholders and can result in significant financial losses and damage to reputation. Detecting and preventing fraud in credit card transactions is critical to minimizing losses and maintaining customer trust. The main objective of this project is to build a model (a web-based system) that can effectively identify fraudulent transactions. This involves collecting and processing large datasets of credit card transactions, including both legitimate and fraudulent transactions, and using machine learning algorithms like decision trees and random forests to train a model to recognize patterns and anomalies. In addition, the system will have strong user authentication protocols that must be in place to prevent unauthorized access to the system.

Research Paper

Oversight Crypto-Virtual Storage Application

Benjamin Mbenji* , G. Glorindal**
*-** DMI-St. John the Baptist University, Lilongwe, Malawi.
Mbenji, B., and Glorindal, G. (2023). Oversight Crypto-Virtual Storage Application. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 20-25. https://doi.org/10.26634/jdf.1.2.20083

Abstract

The Oversight Crypto-Virtual Storage application is designed as a virtual storage solution aimed at curtailing crimes involving data, such as data theft and tampering. The application enables users to privately store files by creating an encrypted box. Data storage is available for a predetermined amount of time. Once this period ends, the user's Box of files will prompt the user to decide whether to extend the storage duration. If the user chooses not to renew their service, the box becomes accessible to everyone on the platform.

Review Paper

Enhancing Cyber Security in Health Care Industry by using ISO 27001 Accreditation

Rashid Husain* , Rabia Khan**, Rajesh Tyagi***, Manoj Kumar Komakula****
*-** Department of Computer Science, Sule Lamido University Kafin Hausa, Jigawa, Nigeria.
***-**** Department of Computer Science and Engineering, Amity University, Haryana, India.
Husain, R., Khan, R., Tyagi, R., and Komakula, M. K. (2023). Enhancing Cyber Security in Health Care Industry by using ISO 27001 Accreditation. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 26-35. https://doi.org/10.26634/jdf.1.2.20020

Abstract

Healthcare Industry plays a pivotal role in every one's life and with rapid advancements in cyber-attack vectors, threat actors and their strategies it has in-need created a necessity and a challenge to the numerous organizations and to the Governments as well, to stand guard and secure the institutes and the data stored with them. To design a secure healthcare system involves several considerations to protect sensitive patient data and ensure the confidentiality, integrity, and availability of information. Lot of work has been published on cyber security along with importance of protecting the Personally Identifiable Information (PII) and patient health records stored in hospitals, and also comparisons were made between paid or licensed tools and open source; however, implementation of the tools in real time was not in place where the financial limitations are a real concern and security is a need. This paper has given insight into important parameters such as risk assessment and security policies etc.

Review Paper

An Extensive Overview on Dark Web

Bhawna* , Bisman Singh**
*-** Department of Computer Science & Engineering, Chandigarh Group of Colleges, Landran, Mohali, Punjab, India.
Bhawna, and Singh, B. (2023). An Extensive Overview on Dark Web. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 36-49. https://doi.org/10.26634/jdf.1.2.19459

Abstract

The dark web has become an infamous cybercrime platform, enticing criminals with the promise of privacy and encryption. This review paper will delve into the dark web's history and evolution, along with the characteristics that make it an attractive arena for cybercriminals. It will explore various types of crimes occurring on the dark web, such as cyberattacks, data breaches, and online fraud, examining their societal impacts. Additionally, this paper will scrutinize law enforcement activities, cybersecurity technologies, and public education programs designed to thwart crimes on the dark web. It will propose suggestions for future research and policy actions aimed at mitigating the adverse effects of cybercrime on the dark web. This study aims to foster a deeper understanding of the dark web and the societal risks posed by cybercrime, influencing the development of effective strategies to prevent such occurrences.