Articles
| Open Access | THE ROLE OF ARTIFICIAL INTELLIGENCE IN THE INVESTIGATION OF CYBERCRIMES
S.Yusupova , Master's student of Tashkent State University of LawAbstract
This article provides a comprehensive analysis of the growing importance of artificial intelligence (AI) technologies in the investigation of modern cybercrimes. In the context of the exponential growth of digital data and the complication of cybercrimes, traditional investigative methods are losing their effectiveness. The article examines in detail the application of AI-based solutions in areas such as data mining, analysis, threat identification, and criminal identification. In addition, legal, ethical, and confidential issues related to the implementation of AI technologies by law enforcement agencies, as well as the future prospects of these technologies, will be discussed. According to the research results, AI can significantly increase the effectiveness of cyber investigations, but appropriate legal and ethical frameworks are necessary to address confidentiality, data security, and ethical issues.
Keywords
Artificial intelligence, cybercrime, international cooperation, digital forensics, data recovery.
References
IBM. (2023). “IBM Watson for Cybersecurity.” https://www.ibm.com/security/artificial-intelligence
Blei, D. M., Ng, A. Y., & Jordan, M. I. (2003). “Latent dirichlet allocation.” Journal of Machine Learning Research, 3, 993-1022.
Devlin, J., Chang, M. W., Lee, K., & Toutanova, K. (2019). “BERT: Pre-training of deep bidirectional transformers for language understanding.” arXiv preprint arXiv:1810.04805.
Koonce, B. (2021). “Convolutional Neural Networks with Swift for Tensorflow: Image Recognition and Dataset Creation for iOS Applications.” Apress.
Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008). “Isolation forest.” In 2008 Eighth IEEE International Conference on Data Mining (pp. 413-422). IEEE.
[6-11] Hochreiter, S., & Schmidhuber, J. (1997). “Long short-term memory.” Neural computation, 9(8), 1735-1780.
Kipf, T. N., & Welling, M. (2016). “Semi-supervised classification with graph convolutional networks.” arXiv preprint arXiv:1609.02907.
Chainalysis. (2023). “Chainalysis Crypto Crime Report.” https://www.chainalysis.com/
Moustafa, N. (2022). “Digital Forensics in the Era of Artificial Intelligence” https://www.routledge.com/Digital-Forensics-in-the-Era-of-Artificial-Intelligence/Moustafa/p/book/9781032244686
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2014). “Generative adversarial nets.” Advances in neural information processing systems, 27.
Fridrich, J. (2009). “Steganography in digital media: principles, algorithms, and applications.” Cambridge University Press.
Darktrace. (2020). “ Darktrace Immune System Version 5 Redefines Enterprise Security” https://www.darktrace.com/news/darktrace-immune-system-version-5-redefines-enterprise-security-5
FireEye. (2023). “FireEye Helix Security Platform.” https://www.fireeye.com/products/helix.html
AccessData. (2023). “Forensic Toolkit (FTK).” https://www.exterro.com/forensic-toolkit
Magnet Forensics. (2023). “AXIOM.” https://www.magnetforensics.com/products/magnet-axiom/
Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993).
European Union. (2016). “General Data Protection Regulation (GDPR).” https://gdpr-info.eu/
O‘zbekiston Respublikasi. (2021). “Kiberxavfsizlik to‘g‘risida”gi qonun. https://lex.uz/docs/5607825
Solove, D. J. (2011). “Nothing to hide: The false tradeoff between privacy and security.” Yale University Press.
O‘zbekiston Respublikasi. (2019). “Shaxsga doir ma’lumotlar to‘g‘risida”gi qonun.
Davies, M., Srinivasa, N., Lin, T. H., Chinya, G., Cao, Y., Choday, S. H., ... & Wang, H. (2018). “Loihi: A neuromorphic manycore processor with on-chip learning.” https://www.wired.com/story/intels-new-chip-design-takes-pointers-from-your-brain/
https://proceedings.mlr.press/v54/mcmahan17a.html
Følstad, A., & Brandtzæg, P. B. (2020). “Users' experiences with chatbots: findings from a questionnaire study.”
INTERPOL. (2023). “Global Cybercrime Strategy.” https://www.interpol.int/Crimes/Cybercrime
ISO/IEC JTC 1/SC 42. (2023). “Artificial Intelligence.” https://www.iso.org/committee/6794475.html
Council of Europe. (2001). “Convention on Cybercrime.” https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.