Advanced Machine Learning Approach For Suspicious Coded Message Detection Using Enigma Cipher
Advanced Machine Learning Approach For Suspicious Coded Message Detection Using Enigma Cipher
Syed Hussain
Computer science and Engineering Dr. Pakkir Mohideen S
Department Computer Application Department
B.S Abdur Rahman Crescent B.S Abdur Rahman Crescent
institute of science & Technology institute of science & Technology
Chennai, India Chennai, India
[email protected] [email protected]
Abstract— Framework to avoid global crime especially following their unlawful operations. Many examp les of
terrorist attacks, bomb blasts, and drone attacks all major and criminality through social networking have been reported. To
minor attacks with the help of SCMD (S uspicious find criminals, the E-crime Agency should be adlibbed with
Cryptographic Message Detection) such as cryptanalysis of advances in technology. The majority of instant messaging
S MS or any messaging system. When the server received a systems (IMS) are built by defin ing their message, video, and
suspicious encrypted message, the proposed framework will sound conferencing limits. Many cases were reported in
decrypt the suspicious message and facilitate in predicting the which people communicated in different languages during
crime, criminal name, location, and criminal details and report the assault season, but E-crime departments are not fully
to the electronic crime agency. To date, no proper solution to
prepared to detect online multilingual suspicious messages.
avoid such a big crime as the world is facing problems still
today along with this machine learning technique, Artificial
Digital offence drills are spreading globally. The CIA, FBI,
Intelligence and semantic web ontology and Cryptanalysis of and other government agencies are efficiently acquiring
Enigma Cipher. Terrorists communicate with their teammates digital data relating to crime and distant knowledge data to
in different locations of the world and instruct with resources predict future cyber-attacks. (Shrestha & Spezzano, 2019).
to attack the government or public while communicating they
use the encrypted message to maintain secrecy. Our II. LIT ERAT URE SURVEY
framework at the server site will detect encrypted messages An understandable communication can be made
and decrypt them with the help of Cryptanalysis of Enigma unintelligible using cryptography's concepts and techniques,
Cipher techniques. The framework will decrypt a suspicious and subsequently that message can be transformed into its
message and expedites predicting the type of crime from
initial form. Plaintext The initial understandable message
microblogs before it gets executed by criminals. Details of
criminals will be alerted to cybercrime the department that Coded text .
reduces the tension for the various security departments.
Criminals use an encrypted message to pass activity among A. Cryptanalysis of Enigma Cipher
teammates who may be in living in any corner of the World
and other people may decrypt and convert it to plain text and The Germans employed the Enig ma encryption as a field
takes action. cypher in World War II. One of the more well-known
ancient encryption devices is the Enigma. There were various
Keywords— Cryptography, cryptanalysis, encryption, decryption,
Machine Learning; Statistical natural language processing other Enig ma variants developed, but the German military
(SNLP); Social networking with instant messengers; type is the one that most criminals utilise for their wicked
Association rule mining (ARM); Suspicious message detection deeds.(Bouchaudy, 2021) (Miller, 1995) (Bruen et al., 2021).
system; SMDs.
B. The Task
I. INT RODUCT ION
The rotors and their arrangement, the 3 letter indication
The Recent terrorist attacks on a Sri Lan kan church, a
settings, the 3 letter ring settings, and the plug board settings
New Zea land mosque, and Indian cities, as well as other
criminal acts, must be considered as a serious issue. The all make up the Enig ma cypher's key space. There are a total
existing terrorism detection systems fail to spot similar of 60*26*6 = 18,534,946,560 d ifferent configurations,
attacks. This research work has attempted to create a system including the 263 indication settings, 263 ring settings, and
to help in the imp lementation of assaults by utilizing a 10 co mbinations of 5 rotors (each of which can have 6
variety of co mmunication mechanisms among attackers.
Since the attacker may employ mu ltilingual communications permutations of order). Additionally, the plug board settings
when communicating, a mu ltilingual message detection add an enormous amount of additional variants. Assuming
system needs to be designed. The proposed framework that the plug board settings are ignored in this scenario,
quickly discovers the accused before they commit a crime solving the ensuing issue is significantly simpler.
and alerts law enforcement, hence reducing crime in society.
The advent of the internet led to (evoked) the emergence The art icles cited above make use of the fact that the
of never-ending digital crime. Cu lprits use cellular phones, plug board and ring settings can be established independently
instant messengers, and Social Networking Destinations to of the rotor order and indicator settings. Breaking down the
send suspicious text messages, which may be quite strict in
XTZHZWXXLIIHFVNDYTSQ
V. ST EPS INVOLVED IN T HE PROPOSED ALGORIT HM Rajaman i, 2012), (Access the GTD | GTD, n.d.)(Mohammed
Flow Chart 2: SPD Mahmood Ali & Rajamani, 2013),
62
Fig. 4. 60
Flow Chart 2: Suspicious pattern detection
58
If suspicious words are found, the message is considered 56
.
to be suspicious, as given in Table I set of suspicious words 54
(SSWDB) in rule 1. KDB has a record of detected stem 52
words with domain and which kind of activity has been 50
performed and metadata help to track the sender and receiver
Murder Fraud Extortion
email id of suspicious word belongs(Mohammed Mah mood
Ali & Rajamani, 2013) (Rajamani et al., n.d.)
Fig. 6. Comparative analysis of three domain
While creating an email id the details like contact number
name age, sex, and all details are stored in EDB and can be Murder, Fraud, Extort ion the domain murder has the highest
accessed with the help of the Relational Wrapper precision value of 60.00 of domain murder > Hence, it maps
Algorithm(Mohammed Mahmood Ali & Rajamani, 2013) to a suspicious word database.
(Rajamani et al., n.d.).
VIII. EXPERIMENT AL RESULT S
The suspicious email id account holder is traced by IP-
To evaluate our proposed system we use precision(Shiri,
Address, and ISP location by a program (R2D Wrapper)
2004) Matrics efficiency of suspicious words extracted only
which generates a report by using an algorithm(Mohammed
on two factors one is precision and another is a recall
Mahmood Ali & Rajamani, 2013) (Rajamani et al., n.d.).
The final report consists of details of criminals with IP Precision =
addresses, ISP, and Email address details according to the
report crime department can take action under their
corresponding act(Mohammed Mahmood Ali & Rajamani,
Recall =
2013),(Rajamani et al., n.d.)
(Mohammed Mahmood Ali et al., 2014) (Mohammed For the domain murder we received a database from
Mahmood Ali & Rajamani, 2013) (Rajamani et al., GTD(Global Terrorisms Database)(Access the GTD | GTD,
n.d.)(Jadhao & Agrawal, 2016), (Mohd Mahmood Ali & n.d.) the most famous database records of terrorists and
criminals all over the world with the latest to 2018 this is the
updated version to date it consists of 191465 ro ws, size 90 [3] Ali, Mohammed Mahmood, & Rajamani, L. (2013). Framework for
MB its codebook can be downloaded with this below link. surveillance of instant messages. International Journal of Internet
Technology and Secured Transactions, 5(1), 18–41.
we can get a complete picture of a terrorist attack or any https://doi.org/10.1504/IJITST.2013.058292
criminal activity by using the following database we analyze [4] Ali, Mohd Mahmood, & Rajamani, L. (2012). APD: ARM deceptive
our system and compare our work with previous system phishing detector system phishing detection in instant messengers
Comparison table is shown below. using data mining approach. Communications in Computer and
Information Science, 269 CCIS(PART I), 490–502.
TABLE I. OUTP UT OBTAINED FROM DOMAIN EXP ERT DATA GT D https://doi.org/10.1007/978-3-642-29219-4_56
[5] Bouchaudy, J.-F. (2021). Enigma: the spoils of Gustave Bertrand, or
Term Proposed “par où tout a commencé.” Cryptologia, 45(4), 309–341.
https://doi.org/10.1080/01611194.2020.1736205
system
[6] Bruen, A., Forcinito, M., & McQuillan, J. (2021). Classical Ciphers
output and Their Cryptanalysis. Cryptography, Information Theory, and
Total 1860 Error‐ Correction, 21–45.
https://doi.org/10.1002/9781119582397.CH2
correctly [7] CHC Global & START – Terrorism Data. (n.d.). Retrieved June 8,
extracted 2021, from https://gtd.terrorismdata.com/
[8] Jadhao, A. R., & Agrawal, A. J. (2016). A digital forensics
Extracted 1704 investigation model for social networking site. ACM International
correctly Conference Proceeding Series, 04-05-Marc, 3–6.
https://doi.org/10.1145/2905055.2905346
Total 1792 [9] Miller, A. R. (1995). The cryptographic mathematics of enigma.
number Cryptologia, 19(1), 65–80. https://doi.org/10.1080/0161-
of words 119591883773
[10] Rajamani, L., Ali, M. M., & Rasheed, M. A. (n.d.). OSMD : Online
possible Suspicious Message Detection Framework for Instant Messaging
Precision 95.08% Systems. 380–385.
[11] Shrestha, A., & Spezzano, F. (2019). Online misinformation: From
Recall 91.61% the deceiver to the victim. Proceedings of the 2019 IEEE/ACM
Here dataset was utilized by generous brainstorming International Conference on Advances in Social Networks Analysis
sessions and for domain experts using GTD. and Mining, ASONAM 2019, 847–850.
https://doi.org/10.1145/3341161.3343536
IX. OBSERVAT ION [12] Tellis, P., & Deepika, N. (2015). Expert System to Detect Suspicious
Words in Online Messages for Intelligence Agency Using FP-growth
It is observed that the Enig ma cypher algorithm is unable Algorithm. 4(7), 103–108.
to detect properly for few suspicious words due to noisy data [13] BramahHazela, J. Hymavathi, T. Rajasanthosh Kumar, S. Kavitha, D.
it can be improved by filtering data it is also identified when Deepa, Sachin Lalar, Prabakaran Karunakaran, "Machine Learning:
Suspicious few words are not exactly matched for such kind Supervised Algorithms to Determine the Defect in High-Precision
of case Rule 3(for undetected words) is applied, It is Foundry Operation", Journal of Nanomaterials, vol. 2022, Article ID
1732441, 9 pages, 2022. https://doi.org/10.1155/2022/1732441
observed that few words are common in many domains such
as location, money for this min imu m threshold value is [14] Access the GTD | GTD. (n.d.). Retrieved April 27, 2020, from
https://www.start.umd.edu/gtd/access/
calculated using GHSL algorithm(Mohammed Mahmood Ali
[15] Miller, A. R. (1995). The cryptographic mathematics of enigma.
et al., 2014) for such cases expert interface is necessary. Cryptologia, 19(1), 65–80. https://doi.org/10.1080/0161-
119591883773
X. FUT URE W ORK AND CONCLUSION
We present a simple solution to the entire world facing
problems with terrorist attacks, extortion, fraud, murder, and
all criminal activity. There was no proper solution for
detecting suspicious cryptographic messages till our
proposed system. The drawback in our system is to improve
precision and decrease recall percentage, detecting criminals
around the globe with the help of enigma cypher
cryptanalysis and reducing crime. This system should be
improved for the detection of all possible languages. The
encrypted words cryptanalysis then convert to plain text then
mapping suspicious words by using our pre-defined database
and GTD(CHC Global & START – Terroris m Data, n.d.)
comparing with suspicious word SSWD if found checking
the profile of the sender and reporting to the e-crime
department.
References
[1] Access the GTD | GTD. (n.d.). Retrieved April 27, 2020, from
https://www.start.umd.edu/gtd/access/
[2] Ali, Mohammed Mahmood, Mohammed, K. M., & Rajamani, L.
(2014). Framework for surveillance of instant messages in instant
messengers and social neworking sites using data mining and
ontology. IEEE TechSym 2014 - 2014 IEEE Students’ Technology
Symposium, 297–302.
https://doi.org/10.1109/TechSym.2014.6808064