Education, Science, Technology, Innovation and Life
Open Access
Sign In

Research on Network Crime and Security Strategy Based on K-means Cluster Analysis Model

Download as PDF

DOI: 10.23977/acss.2025.090214 | Downloads: 4 | Views: 229

Author(s)

Zimeng Hui 1, Kaiwen Zhao 1

Affiliation(s)

1 School of Business, Xi'an International Studies University, Xi'an, Shaanxi, China

Corresponding Author

Kaiwen Zhao

ABSTRACT

Cyber security is one of the important issues in global territorial governance, which concerns the security, stability, economic development and public interests of a country and even the whole world. This paper mainly studies the distribution pattern of global cybercrime and establishes the index system of global cybercrime index (GCI). According to the entropy weight method, the top three countries in the global cybercrime index are Indonesia, Tunisia and Nigeria. Countries with an index size above 3.50 are divided according to different geographical characteristics, and the regions with a high proportion of global cybercrime index are Europe, the Pacific region, the tropical region, the Eastern Hemisphere and the coastal region. The K-means cluster analysis model is established, and it is concluded that the countries with high density of cyber crimes include Indonesia, Tunisia, Nigeria, etc. Countries with high success rates include the United States, Switzerland, Serbia, etc. Countries with high rates of reported cybercrime incidents include Albania, Argentina and Armenia. Countries with high litigation rates include Panama, South Korea and Lithuania. The global distribution of cybercrime presents a relatively common pattern, which requires countries to prevent and improve laws and policies in different regions.

KEYWORDS

Cyber Security; WCI Index System; Entropy Weight Method; K-Means

CITE THIS PAPER

Zimeng Hui, Kaiwen Zhao, Research on Network Crime and Security Strategy Based on K-means Cluster Analysis Model. Advances in Computer, Signals and Systems (2025) Vol. 9: 113-119. DOI: http://dx.doi.org/10.23977/acss.2025.090214.

REFERENCES

[1] Tan Youzhi. Global Governance of Cyberspace: International Situation and Chinese Path[J]. World Economy and Politics, 2013(12):18.
[2] Kwon D, Borrion H, Wortley R.Measuring Cybercrime in Calls for Police Service[J].Asian Journal of Criminology, 2024,19(3):329-351. 
[3] Hegarty K,Wilken R,Meese J, et al.Shaping infrastructural futures: The International Telecommunication Union's visions for mobile communications and the anticipatory politics of 5G standardization[J].Mobile Media & Communication, 2025,13(1):171-191. 
[4] Xiang W, Yuanhao M,Hao L, et al.Clustering Optimized Portrait Matting Algorithm Based on Improved Sparrow Algorithm[J].Tehnički vjesnik,2023,30(6):1911-1919.
[5] Parveen S, Yang S M. Lasso-Based k-Means++ Clustering [J]. Electronics, 2025, 14(7): 1429-1429.
[6] Kalpit S,Arunabha M. Kernel naïve Bayes classifier-based cyber-risk assessment and mitigation framework for online gaming platforms[J].Journal of Organizational Computing and Electronic Commerce,2021,31(4):343-363.

Downloads: 38554
Visits: 698000

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.