Professional Documents
Culture Documents
Child Predator Detection - Formatted Paper
Child Predator Detection - Formatted Paper
Volume 4 Issue 1
ABSTRACT
Increase in Internet use and facilitating access to social media platform has help the predatory
to establish online relationships with children which has boost to increase in online
solicitation. We are proposing system that enables us to detect a predator in online chats using
Text classification method. In this paper, the use of machine learning algorithm named as
support vector machine has been used to determine cyber predators. The main objective of our
system is to detect child predator base on chat, comments and post of social media account and
send predator record to cyber cell admin & the use of PAN12 dataset is done for text
classification Purpose. This paper presents our current development to enable the creation of
the child predator system using SVM text classification.
chats which has based on two stage conversation to find out all possible attempt
classification. The first stage consists of of child grooming. Use of text analysis
distinguishing the predatory conversation method was primarily done for separating
from normal conversation. At the end of the adult predator pretending to be child. It was
second stage unique predators are derived a step towards detecting online groomers
as a result. They also inspect other machine and making the Internet secure for young
learning classifier namely Naïve Bayes, children.
Random Forest, KNN, Neural Network,
Support Vector Machine, Decision Tree Detection of Cyber Grooming in Online
with the help of bag of words using Conversation. [3] Author: Elif Varol Altay,
different kind of term weighing method for Bilal Altas. They focus was on detection of
this work. Two ensemble techniques were child predators in online chat
also proposed to upgrade classification conversations, 3 different approaches such
task. Their experiment was based on as message-based, author-based and
PAN12 dataset that shown best method conversation-based which is combined
using soft voting-based ensemble for their with 5 more classification algorithms and 2
first stage and in second stage Naïve Bayes features sets. They achieved best results
method obtained F0.5 score from 0.9348 using either the author-based approach with
which would have placed at top position in the classifier Neural Network on the
PAN12 in competition. TF-IDF feature set, or using Ridge or the
Naïve Bayes classifier in
A Step Towards Detecting Online conversation-based approach on TF-IDF
Grooming-Identifying Adults Pretending to feature set. And for the first time in this
be Children. [2] paper, they looked out the quickest way
Author: Michael Ashcroft, Lisa Katti, possible to detect predator and came up
Maxime Meyer implemented automated with the result that in most cases 26-161
investigation of chat room discussion to messages are sufficient is conversation,
detect the possible endeavor of grooming. showing that it can have an early detection
Grooming is a vital problem in today’s system of predators instead of knowing in
world where extra time is spent online. To hindsight children was victim of predator.
become friends and begin a relationship
with youth victims in online circle, Detecting Child Grooming Behavior
groomers frequently affect to be children. Patterns on Social Media.[4] Author:
In this paper they relate an approach that Amparo Elizabeth Cano, Miriam
can be used to detect if an adult is trying to Fernandes, Harith Alani. The paper
pretend as child in a chat room presented a study of online grooming
conversation. The approach elaborates a phases with the help of a machine learning
two-step process where in authors are first perspective. The implemented a method to
divided as children or adults, and then each characterize phases by psycho-linguistic
child is being analyzed and wrong children and discourse patterns content and features
distinguished from genuine children. Their covering sentiment. In this investigation of
results shown that if differentiating adults online chat conversation have shown great
pretending to be children and real output in automatically classifying chat
children’s is quite hard, but have conversations into different grooming
distinguished is with high accuracy. In this steps. Deep understanding of predator
paper they debate about accuracy as well as behavior and way of writing is very
features proposed which one important for essential part to having look at for
the result. It was prime step towards implementing powerful systems for
automated investigation of chat room
detection of predatory conversations and which is very huge and disadvantage of this
predators on social media platform. system is if in chatbot’s dataset information
about the topic is not present then it will not
Cyber Bullying detection.[5] Author: be able to answer the predator.
Batoul Haipar, Maroun Phamoun, Fadi
yamout. In their research they have EXISTING SYSTEM
detected cyber bullying like sending sexual There exists various child predator
contents, threatening messages, sending detection system which are used in gaming,
and forwarding private messages to others audio chat and in various online
which is faced by various children around entertainment platform. While playing
the world as well as in Arab countries too, games or for using online audio chat there
earlier researches were done in many exists a child predator system which detects
languages so this time they have mainly an online sexual harassment and prevent
worked on Arabic language cyber bullying child from getting abused or getting
and the detection is done with the help of harassed by sexual predator as this existing
machine learning and language processing. system is only used when the children are
playing games on internet or doing any
A Conversational Agent to Detect Online audio chats. As now we are in internet era
Sex Offenders.[6] Author: John Ibanez various children are now days using social
Rodriguez, Santiago Rocha Duran, Daniel media platform for various social activities.
Diaz-Lopez, Javie Pastor-Galindo, Felix They are mostly active on social media so
Gomez Marmol. There work presents a to prevent child harassment we need a child
system which is called as chatbot, it is used predator detection system for social media.
to detect suspects by using NLP which
interacts with suspect in order to identify PROPOSED SYSTEM
child sexual abuse. An ACE (artificial We propose system for child predator
conversational entity) is used to connect detection system. We implementing 3
different online chat services which help in Modules for detection system.
starting a conversation. Chatbot analyses User Module (Child/ predator)
the conversation which happens between Training Module
the chatbot and the suspect and calculate Cyber System
features to know the suspect behavior.
Chatbot consist a knowledge base data Function of System
which communicates with humans. It User Module: In this project we will show
consists of interactive module which is two types of user. First normal user another
active during the conversation with type showing predator behavior.
suspects and stores information, chats of
suspect in chatbot database. Another one is Training Module: In training Module we
analysis module; this comes in play after are using SVM algorithm for text
the conversation gets finished which classification and image detection. After
categorize and describes suspect behavior. Training Module, we will send predator
Mainly this system is used to build dataset report to cyber admin.
of suspects and categorize them in different Cyber System: Checking all predator report
groups on the basis of their characteristics. and taking action according to that report.
The main advantage of the system is that it
can communicate with 900 suspects weekly