Research on Cybercrime Based on BP Neural Network Algorithm

Authors

  • Kaihao Si
  • Xinhao Zhang
  • Siyuan Wu

DOI:

https://doi.org/10.54097/t2s62d74

Keywords:

Cybercrime, BP neural network algorithm, grey correlation analysis, GUI.

Abstract

Cybercrime is a variety of criminal activities carried out using digital devices or networks. Owing to its inherent complexity, countries have developed different policies and laws to safeguard cybersecurity. This paper shows the global distribution of different indicators of cybercrime, examines the relevance of different national policies, and explores the extent to which different demographic characteristics influence cybercrime. This article first defines four main indicators to describe cybercrime, and collects data related to cybercrime from VCDB and NETSCOUT to display the global distribution of these four indicators. A model for extracting distribution characteristics of cybercrime was constructed, and Pearson coefficient was used to analyze the relationship between cybercrime and many influencing factors. Finally, it was concluded that the distribution of cybercrime is concentrated in countries with larger populations, weaker network protection technologies and infrastructure, and weaker judicial systems. At the same time, a network security policy correlation analysis model was constructed using the five network security policy indicators provided by ITU. The GUI indicators were combined with the distribution and data preprocessing of cybercrime, and linear regression algorithm was used to analyze the correlation of GUI policy indicators. By using the BP neural network algorithm to reduce the impact of nonlinear relationships, it was found that the formulation of intergovernmental cooperation policies and government capacity building policies has a more significant effect on suppressing cybercrime. Finally, this article analyzes the impact of specific national policies on cybercrime.

Downloads

Download data is not yet available.

References

[1] Lehto M. Cyber-attacks against critical infrastructure [M] // Cyber security: Critical infrastructure protection. Cham: Springer International Publishing, 2022: 3-42.

[2] Fereshteh Momeni. The impact of social, cultural, and individual factors on cybercrime. Educational Administration: Theory and Practice, 2024.30 (5), 10152–10159.

[3] Shillair R, Esteve-González P, Dutton W H, et al. Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise [J]. Computers & Security, 2022, 119: 102756.

[4] Nguyen T A, Koblandin K, Suleymanova S, et al. Effects of ‘Digital’ Country’s Information Security on Political Stability [J]. Journal of Cyber Security and Mobility, 2022: 29-52.

[5] Folorunso A, Wada I, Samuel B, et al. Security compliance and its implication for cybersecurity [J]. World Journal of Advanced Research and Reviews, 2024, 24 (01): 2105-2121.

[6] Schober P, Boer C, Schwarte L A. Correlation coefficients: appropriate use and interpretation [J]. Anesthesia & analgesia, 2018, 126 (5): 1763-1768.

[7] Priya K S. Linear regression algorithm in machine learning through MATLAB [J]. Int J Res Appl Sci Eng Technol, 2021, 9 (12): 989-995.

[8] Song S, Xiong X, Wu X, et al. Modeling the SOFC by BP neural network algorithm [J]. International Journal of Hydrogen Energy, 2021, 46 (38): 20065-20077.

[9] Chen S, Hao M, Ding F, et al. Exploring the global geography of cybercrime and its driving forces [J]. Humanities and Social Sciences Communications, 2023, 10 (1): 1-10.

[10] Mishra A, Alzoubi Y I, Anwar M J, et al. Attributes impacting cybersecurity policy development: An evidence from seven nations [J]. Computers & Security, 2022, 120: 102820.

Downloads

Published

28-09-2025

How to Cite

Si, K., Zhang, X., & Wu, S. (2025). Research on Cybercrime Based on BP Neural Network Algorithm. Highlights in Science, Engineering and Technology, 155, 182-189. https://doi.org/10.54097/t2s62d74