Research on the regularity of network security crimes based on mathematical models

Authors

  • Luze Yang

DOI:

https://doi.org/10.54097/a5jzka81

Keywords:

Cybercrime, Decision Tree, Policy analysis, Partial Least Squares Regression (PLSR) model.

Abstract

In order to address the current lack of universal research on network security issues in literature, and the absence of tailored research for different countries and regions, this paper conducts research using clustering analysis models, ARIMA time series prediction models, decision tree prediction models, and PLSR models. This article first collects data from authoritative platforms such as VCDB database to ensure the accuracy of input data, and then visualizes the data through heat maps to observe initial patterns. To verify the hypothesis, this paper adopts the K-means clustering model and uses the elbow rule to determine four clusters as the "elbow points" of the dataset. This article chooses GCI as the indicator for evaluating national policies. Considering the uniqueness of policy implementation, the data was normalized over time and the ARIMA model was used to predict the occurrence rate, while the decision tree model was used to determine the importance of each dimension. The results indicate that organizational measurement dimensions account for 88.5% of importance. Given that the data spans multiple countries and the sample data is limited, this article chooses to use the PLSR model together to alleviate this issue. Calculations show that GDP is the most closely related demographic feature to cybercrime, with an average value of 1.4202. Other demographic features show varying degrees of correlation.

 

Downloads

Download data is not yet available.

References

[1] Sen P, Roy M, Pal P. Application of ARIMA for forecasting energy consumption and GHG emission: A case study of an Indian pig iron manufacturing organization [J]. Energy, 2016, 116: 1031 - 1038.

[2] Cybercrime in social media: Theory and solutions [M]. CRC Press, 2023.

[3] Akram M S, Mir M J, Rehman A. Dimension of cyber-warfare in Pakistan’s context [J]. Journal of Positive School Psychology, 2023, 7 (6): 82 - 94.

[4] Veena K, Meena K, Tee Karaman Y, et al. C SVM classification and KNN techniques for cybercrime detection [J]. Wireless Communications and Mobile Computing, 2022, 2022 (1): 3640017.

[5] Alagappan A, Venkata chary S K, Andrews L J B. Augmenting Zero Trust Network Architecture to enhance security in virtual power plants [J]. Energy Reports, 2022, 8: 1309 - 1320.

[6] Wang H. Big data security management countermeasures in the prevention and control of computer network crime [J]. Journal of Global Information Management (JGIM), 2021, 30 (7): 1 - 16.

[7] Yokotani K, Takano M. Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities [J]. Computers in Human Behavior, 2022, 128: 107099.

[8] Lubis M, Handayani D O D. The relationship of personal data protection towards internet addiction: Cybercrimes, pornography and reduced physical activity [J]. Procedia Computer Science, 2022, 197: 151 - 161.

[9] Timofeyev Y, Dremova O. Insurers’ responses to cybercrime: evidence from Russia [J]. International Journal of Law, Crime and Justice, 2022, 68: 100520.

[10] Tsolekile S. The plausibility of developing a digitised township economy: A study of townships in Cape Town [J]. 2021.

Downloads

Published

26-08-2025

How to Cite

Yang, L. (2025). Research on the regularity of network security crimes based on mathematical models. Highlights in Science, Engineering and Technology, 152, 96-110. https://doi.org/10.54097/a5jzka81