Authors :
Ruhel Shaikh; Gaurav Joshi; Dr. K. Himabindu
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/3h8wed3p
Scribd :
https://tinyurl.com/5cxjaz7b
DOI :
https://doi.org/10.38124/ijisrt/25mar413
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
Social media has become an unexpected battle- ground in the fight against drug trafficking, with dealers finding
new ways to sell illegal substances online. Our research tackles this problem head-on by developing a smart monitoring
system that acts like a digital detective, watching over social media platforms to spot potential drug-related activities.
Think of our system as an extra set of eyes for law enforcement, but powered by artificial intelligence. Instead of officers
spending endless hours scrolling through social media posts, our system does this work automatically. It’s designed to
understand both images and text conversations, picking up on subtle clues that might signal drug- related activity. What
makes our approach special is how it presents information to law enforcement officers. Rather than drowning them in
complex data, the system provides clear, easy- to-understand alerts and visual reports. It’s like having a smart assistant
that taps you on the shoulder when something suspicious needs attention. This matters because traditional monitoring
methods are struggling to keep up with how quickly drug dealers change their tactics on social media. Our system helps
law enforcement work smarter, not harder. It processes huge amounts of social media content in real-time, giving officers
the insights they need to take action quickly. The research shows that bringing artificial intelligence into the fight against
online drug trafficking isn’t just about working faster – it’s about working better. By automating the tedious parts of
monitoring social media, officers can focus their energy on what they do best: investigating leads and stopping drug
trafficking.
Keywords :
Artificial Intelligence, Drug Trafficking, Social Media Surveillance, Cybersecurity, Law Enforcement Technology, Automated Monitoring, Digital Investigation Tools.
References :
- Prince, Nayem Uddin, Muhammad Ashraf Faheem, Obyed Ullah Khan, Kaosar Hossain, Ahmad Alkhayyat, Amine Hamdache, and Ilias Elmouki. ”AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction.” Nanotechnology Percep- tions 20 (2024): 332-353.
- A. Paul Rupa and A. Gangopadhyay, ”Multi-modal Deep Learning Based Fusion Approach to Detect Illicit Retail Networks from Social Media,” 2020 International Conference on Computational Science and Computa- tional Intelligence (CSCI), Las Vegas, NV, USA, 2020, pp. 238-243, doi: 10.1109/CSCI51800.2020.00047.
- Keywords: Drugs;Deep learning;Freeware;Social net- working (online);Law enforcement;Scientific comput- ing;Modal analysis;multi-modal;deep learning;illicit re- tail network detection;drug dealing detection;drug re- lated post detection;social media analytics;Illicit network detection,
- N. Pramanik, P. Das, R. Roy and S. Bal, ”Job Recommendation System Based on Candidate Skills,” 2024 Third International Conference on Smart Tech- nologies and Systems for Next Generation Comput- ing (ICSTSN), Villupuram, India, 2024, pp. 1-5,doi: 10.1109/ICSTSN61422.2024.10671166.
- H. Muniganti, B. Nayak and D. Gope, ”Diag- nosis of Radiating Elements for CISPR 25 RE Test Setup Using Huygens Box Method,” in IEEE Letters on Electromagnetic Compatibility Practice and Applications, vol. 2, no. 2, pp. 40-45, June 2020, doi: 10.1109/LEMCPA.2020.2985342.
- Electric fields;Antennas;Electromagnetic compatibil- ity;Power cables;Resonant frequency;Layout; Transfer functions;Radiated emissions;CISPR 25;huygens box
- Bin Yea, Jingjing Jiang, Junguo Liu, Yi Zheng, Nan Zhou Renewable and Sustainable Energy Reviews Volume 135, January 2021, 110415
- Prince, N.U., Faheem, M.A., Khan, O.U., Hossain, K., Alkhayyat, A., Hamdache, A. and Elmouki, I., 2024. AI- Powered Data-Driven Cybersecurity Techniques: Boost- ing Threat Identification and Reaction. Nanotechnology Perceptions, 20, pp.332-353.
- Dean, B. Social Network Usage Growth Statistics: How Many People Use Social Media in 2024? Back- linko: Cheyenne, WY, USA, 2024; Available online: https://backlinko.com/social-media-users (accessed on 19 April 2024).
- Shokoufeh Salimi, Suhad A.A.A.N. Almuktar, Miklas Scholz Journal of Environmental Management Volume 286, 15 May 2021, 112160
- Morgan, S. Cybercrime to Cost the World 8 Trillion Annually in 2023. Cybercrime Magazine. 17 October 2022. Available online: https://cybersecurityventures.com/ cybercrime-to-cost- the-world-8-trillion-annually-in-2023/ (accessed on 19 April 2024).
- Digital Forensics and Social Media: Ethics, Challenges and Opportunities; Birkbeck, University of London: London, UK, 2019; Available online: https://www.bbk.ac.uk/ news/digital-forensics-and- social-media-ethics-challenges-and-opportunities/ (accessed on 19 April 2024).
- Studiawan, H.; Sohel, F.; Payne, C. A survey on forensic investigation of operating system logs. Digit. Investig. 2019, 29, 1–20. [Google Scholar]
- Abu Bakar, R., Kijsirikul, B. (2023). Enhancing Net- work Visibility and Security with Advanced Port Scan- ning Techniques. Sensors, 23(17), 7541.
- Xia, Wenfeng, et al. ”A survey on software-defined networking.” IEEE Communications Surveys Tutorials 17.1 (2014): 27-51.
- Sahay, Rishikesh, Weizhi Meng, and Christian D. Jensen. ”The application of software defined networking on securing computer networks: A survey.” Journal of Network and Computer Applications 131 (2019): 89-108.
- Gao, Ke, Cherita Corbett, and Raheem Beyah. ”A pas- sive approach to wireless device fingerprinting.” 2010 IEEE/IFIP International Conference on Dependable Sys- tems Networks (DSN). IEEE, 2010.
- Lasˇtovicˇka, Martin, et al. ”Passive operating system fin- gerprinting revisited: Evaluation and current challenges.” Computer Networks 229 (2023): 109782.
- Li, Ruoshi, Markus Sosnowski, and Patrick Sattler. ”An overview of os fingerprinting tools on the internet.” Network 73 (2020): 73-77.
- Xu, Q., Zheng, R., Saad, W. and Han, Z., 2015. Device fingerprinting in wireless networks: Challenges and op- portunities. IEEE Communications Surveys Tutorials, 18(1), pp.94-104.
- Arkin, Ofir. ”A remote active OS fingerprinting tool using ICMP.” login: the Magazine of USENIX and Sage 27.2 (2002): 14-19.
- Ashoor, Asmaa Shaker, and Sharad Gore. ”Difference between intrusion detection system (IDS) and intrusion prevention system (IPS).” Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 4. Springer Berlin Heidelberg, 2011.
Social media has become an unexpected battle- ground in the fight against drug trafficking, with dealers finding
new ways to sell illegal substances online. Our research tackles this problem head-on by developing a smart monitoring
system that acts like a digital detective, watching over social media platforms to spot potential drug-related activities.
Think of our system as an extra set of eyes for law enforcement, but powered by artificial intelligence. Instead of officers
spending endless hours scrolling through social media posts, our system does this work automatically. It’s designed to
understand both images and text conversations, picking up on subtle clues that might signal drug- related activity. What
makes our approach special is how it presents information to law enforcement officers. Rather than drowning them in
complex data, the system provides clear, easy- to-understand alerts and visual reports. It’s like having a smart assistant
that taps you on the shoulder when something suspicious needs attention. This matters because traditional monitoring
methods are struggling to keep up with how quickly drug dealers change their tactics on social media. Our system helps
law enforcement work smarter, not harder. It processes huge amounts of social media content in real-time, giving officers
the insights they need to take action quickly. The research shows that bringing artificial intelligence into the fight against
online drug trafficking isn’t just about working faster – it’s about working better. By automating the tedious parts of
monitoring social media, officers can focus their energy on what they do best: investigating leads and stopping drug
trafficking.
Keywords :
Artificial Intelligence, Drug Trafficking, Social Media Surveillance, Cybersecurity, Law Enforcement Technology, Automated Monitoring, Digital Investigation Tools.