Identifying Drug Traffickers on Encrypted Messaging Apps

Authors

  • R. Karthikeyan Assistant Professor, Department of Computer Science and Engineering, J.N.N Institute of Engineering, Kannigaipair, Tamil Nadu, India Author
  • Mopuru Deepika Department of Computer Science and Engineering, J.N.N Institute of Engineering, Kannigaipair, Tamil Nadu, India Author
  • Nelamala Yashwanth Department of Electronic Communication and Engineering, J.N.N Institute of Engineering, Kannigaipair, Tamil Nadu, India Author
  • Athikayala Pranay Kumar Yadav Department of Computer Science and Engineering, J.N.N Institute of Engineering, Kannigaipair, Tamil Nadu, India Author
  • Duvuru Mohith Reddy Department of Computer Science and Engineering, J.N.N Institute of Engineering, Kannigaipair, Tamil Nadu, India Author

DOI:

https://doi.org/10.32628/CSEIT25112818

Keywords:

Drug trafficking, encrypted messaging, machine learning, natural language processing, anomaly detection, network analysis, cybersecurity

Abstract

With the increasing use of encrypted messaging applications, drug traffickers exploit these platforms for illegal transactions, making detection and enforcement challenging. This paper proposes a machine learning-based approach to identify drug traffickers by analysing communication patterns, metadata, and behavioural anomalies. The system employs Natural Language Processing (NLP), network analysis, and anomaly detection algorithms to flag suspicious activities while preserving user privacy. The proposed framework integrates real-time monitoring and automated alerting mechanisms, enhancing law enforcement’s ability to combat digital drug trafficking effectively.

Downloads

Download data is not yet available.

References

A. Smith, B. Johnson, "Machine Learning for Cybersecurity: A Comprehensive Review," IEEE Transactions on Cybersecurity, vol. 10, no. 2, pp. 123-135, 2023.

C. Lee, D. Kim, "Anomaly Detection in Encrypted Messaging Systems," IEEE Conference on AI Security, 2022.

M. Brown, "AI and Crime Prevention: Challenges and Solutions," IEEE Security & Privacy Journal, vol. 18, no. 4, pp. 45-52, 2021.

P. Wang, X. Huang, "Deep Learning for Image Processing in Security Systems," IEEE Transactions on Image Processing, vol. 28, no. 5, pp. 2432-2443, 2019.

J. Lee, A. Joshi, "Social Media Analytics for Crime Detection and Prevention," Journal of Big Data, vol. 7, no. 1, pp. 1-18, 2020.

T. Y. Park, "Automating Criminal Activity Detection Using AI in Social Media Monitoring," Security and Privacy Journal, vol. 8, no. 4, pp. 284-296, 2021.

M. Johnson, R. Perez, "AI-Driven Visual Pattern Recognition for Detecting Illicit Activities," Journal of AI Research, vol. 23, pp. 121-138, 2020.

A. Qureshi, H. Khan, "Machine Learning Algorithms for Anomaly Detection in Social Media," IEEE Access, vol. 9, pp. 134567- 134578, 2021.

R. Gupta, A. Verma, "Using Deep Learning for Identifying Drug Trafficking Patterns in Social Networks," Neural Computing and Applications, vol. 34, pp. 3157-3168, 2022.

X. Sun, Y. Wang, "AI Techniques for Crime Prevention in Digital Platforms," Security and AI Journal, vol. 12, no. 2, pp. 67-74, 2021.

D. Singh, "Real-Time Image Classification for Crime Detection in Social Media," Journal of Multimedia Tools and Applications, vol. 80, no. 13, pp. 19921-19935, 2021.

A. Patel, "Using AI to Combat Online Drug Trade: A Machine Learning Approach," International Journal of Security Science, vol. 10, no. 3, pp. 215-222, 2021.

F. Liu, S. Chen, "Automating Social Media Monitoring for Illicit Drug Detection," IEEE Transactions on Cybernetics, vol. 52, no. 1, pp. 122-133, 2022.

Downloads

Published

09-04-2025

Issue

Section

Research Articles