IJMECS Vol. 13, No. 5, 8 Oct. 2021
Cover page and Table of Contents: PDF (size: 498KB)
Full Text (PDF, 498KB), PP.23-31
Views: 0 Downloads: 0
Internet addiction, child protection, log file, machine learning, weighted support vector machine
The problem of the Internet addiction (IA) arose after the rise of the Internet. Some of the Internet users include children and teenagers and they are active in a virtual environment. Most minor users are not well aware of the dangers posed by information abundance. One of these dangers is the IA. Excessive use of the Internet is addictive, and some users experience a high risk of addiction. IA can negatively affect the children's health, psychology, socialization and other activities. There is a great need to the development of forecasting programs and various technological approaches for the identification of IA among Internet users, especially children and adolescents. This article uses machine-learning techniques to detect IA. Activities of children in the Internet environment is analyzed. The log-files of children and their IA problem are explored. To determine the degree of IA among children and adolescents an experiment is conducted on public dataset. The effectiveness of the methods is analyzed by various evaluation metrics and promising results are obtained.The results show better performance of Weighted SVM, compared to BernoulliNB, Logistic Regression, MLPClassifier, SVM classifiers. Acquired results of the research provide kids information security. To evaluate a kids IA helps to identify their psychological conditions, and it creates a better situation for parents, teachers, and other related people to communicate with children and teenagers better way.
Rasim M. Alguliyev, Fargana J. Abdullayeva, Sabira S. Ojagverdiyeva, " Log-File Analysis to Identify Internet-addiction in Children", International Journal of Modern Education and Computer Science(IJMECS), Vol.13, No.5, pp. 23-31, 2021.DOI: 10.5815/ijmecs.2021.05.03
[1] Alguliyev R.M &Mahmudov R.Sh.,"Internet addiction and issues on the struggle against it", Problems of Information Technologies, No.2, pp.7-18, 2012.
[2] Young K.S. & Rodgers R.C,"The Relationship Between Depression and Internet Addiction", CyberPsychology & Behavior, vol.1, No.1, pp. 25-28, 1998.
[3] Young K.S., “Internet addiction: Evaluation and treatment,” Student British Medical Journal, 1999, 7, 351-393.
[4] Young K.S., "Internet addiction: The emergence of a new clinical disorder", Cyberpsychology&Behavior, vol.1, No.3, pp.237-244,1998.
[5] Whang LS-M., Lee, S., & Chang, G., "Internet over-users’ psychological profiles: a behavior sampling analysis on Internet addiction", CyberPsychology & Behavior, vol.6, No.2, pp.143-150, 2003.
[6] Alguliyev, R.M., & Ojagverdieva, S.S.,"Conceptual Model of National Intellectucal System for Children Safety in Internet Environment", International Journal of Computer Network and Information Security (IJCNIS), vol.11, No.3, pp.40-47, 2019.
[7] Černja, I., Vejmelka, L., & Rajter, M., Internet addiction test: Croatian preliminary study. BMC Psychiatry 19, 388 (2019).
[8] Mahbobor R., "Addiction of Information and Communication Technology (ICT) and Internet by the Bangladeshi University Students and Its Impact on Their Future", International Journal of Information Technology and Computer Science(IJITCS), vol.10, No.8, pp.56-68, 2018.
[9] Mei,S., Yau, Y.H., Chai, J., Guo, J., & Potenza, M.N., "Problematic internet use, well-being, self-esteem and self- control: Data from a high-school survey in China", Addictive Behaviors, vol.61, pp.74-79, October 2016.
[10] Green, L., Brady, D., Ólafsson, K., Hartley, J., & Lumby, C., "Risks and safety for Australian children on the Internet", Cultural science, vol. 4, No. 1, p.1-75, 2011.
[11] Jang, M.H., & Ji, E.S., "Gender differences in associations between parental problem drinking and early adolescents", Internet addiction. Journal for Specialists in Pediatric Nursing, vol.17, No.4, pp.288-300, 2012,
[12] Šmahel, D., Vondráˇcková, P.L., Blinka, S., & Etcheverry, G., "Comparing addictive behavior on the Internet in the Czech Republic, Chile and Sweden", World Wide Internet: Changing societies, economies and cultures, China: University of Macau, pp.544-582, 2009.
[13] Hemant, H., & Rasika, I., "An approach for MapReduce based Log analysis using Hadoop", In IEEE Sponsored 2’nd International Conference On Electronics And Communication Systems, IEEE, pp.1264-1268, 2015.
[14] Qin, T., Gao, Y.L., Wei, L.Y., Liu, ZL., & Wang, CX., “Potential threats mining methods based on correlation analysis of multi-type logs”, IET Networks, vol.7, pp. 299-305, 2018.
[15] Azizi,Y., Azizi, M., & M.Elboukhari, "Log files Analysis Using MapReduce to Improve Security", Procedia Computer Science,vol.148, pp. 37–44, 2019.
[16] Fu, Q, Lou, J.G., Wang, Y., & Li, J., "Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis”, ICDM '09: Proceedings of the 2009 Ninth IEEE International Conference on Data Mining, In ninth IEEE International Conference on Data Mining (ICDM), pp.149-158, December 2009.
[17] Qin T., Gao YL., Wei LY., Liu ZL., &Wang, CX., Potential threats mining methods based on correlation analysis of multi-type logs/IET NETWORKS, 2018, vol. 7, pp. 299-305.
[18] Displaying Virtual Memory Statistics (vmstat), 2010, https://docs.oracle.com/cd/E19455-01/805-7229/6j6q8svh5/index.html
[19] Vigna, G. & Kemmerer, R.A., "NetSTAT: A network-based intrusion detection approach", In 14th Annual Computer Security Applications Conference (Cat. No.98EX217), IEEE., pp. 1-10, 1998.
[20] Cao, N., Qiao, G., Liu, Y., & Pan,W., "System anomaly detection in distributed systems through MapReduce-based Log Analysis", In 3rd International conference on advanced computer theory and engineering (ICACTE), IEEE, pp.410-413, 2010.
[21] Vondrackova, P., & R.Gabrhelík, "Prevention of Internet addiction: A systematic review", Journal of Behavioral Addictions, vol.5, No.4, pp.568-579, 2016.
[22] Beard, K.W., & Wolf, E.M., "Modification in the proposed diagnostic criteria for Internet addiction", Cyber-Psychology & Behavior, vol.4, No.3, pp. 377-383, 2001.
[23] Romano, J.L., "Prevention in the twenty-first century: Promoting health and well-being in education and psychology", Asia Pacific Education Review, vol.15, No.3, pp. 417-426, 2014.
[24] Kuss, D.J., Rooij, A.J., Shorter, G.W., Griffiths, M.D., & Mheen, D.,"Internet addiction in adolescents: Prevalence and risk factors", Computers in Human Behavior, vol.29, Issue 5, pp 1987-1996, 2013.
[25] Nandhini, C., & Krishnaveni, K., "Evaluation of Internet Addiction Disorder among Students", Indian Journal of Science and Technology, vol.9, Issue: 19, pp.1-5, 2016.
[26] Singh, A., & Babbar, S., "Detecting Internet Addiction Disorder Using Bayesian Networks", In: Panda B., Sharma S., Roy N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science, vol.799, pp.80-95, 2018, Springer, Singapore.
[27] Cheng, C., & Li, A.Y., "Internet Addiction Prevalence and Quality of (Real) Life: A Meta-Analysis of 31 Nations Across Seven World Regions", Cyberpsychology, Behavior, And Social Networking, vol.17, No. 12, pp.755-760, 2014.
[28] Ifdil, I., Putri, Y.E., Fadli, R.P., Erwinda, L., Suranata, K., Ardi, Z., Fitria, L., Churnia, E., Zola, N., Barriyah, K., & Rangka, I.B., Measuring internet addiction: comparative studies based on gender using Bayeian analysis, Journal of Physics: Conf. Series, (1114), pp.1-8, 2018,
[29] Canan, F., Ataoglu, A., Ozcetin, A., & Icmeli, C., "The association between Internet addiction and dissociation among Turkish college students", Comprehensive Psychiatry, vol.53, №5, pp.422-426, 2012.
[30] Di, Z., Gong, X., Shi, J., Ahmed, H.O., & Nandi, A.K., "Internet addiction disorder detection of Chinese college students using several personality questionnaire data and support vector machine", Addictive Behaviors Reports, vol.10, pp.1-9, 2019,
[31] Chen, C., & Lee, H., (2013). Discussion on Adolescent Internet Addiction Counseling Strategies through DEMATEL. I. J. Modern Education and Computer Science, 6, 9–16.
[32] Rushikesh P., “Support Vector Machines (SVM) — An Overview”, https://towardsdatascience.com/https-medium-com-pupalerushikesh-svm-f4b42800e989, 2018.
[33] Tolles, J., &Meurer, W., "Logistic Regression Relating Patient Characteristics to Outcomes", JAMA, vol. 316, № 5, pp.533-534, 2016.
[34] Sebastian R., “Naive Bayes and Text Classification I - Introduction and Theory”, (this version, v4), https://arxiv.org/abs/1410.5329, 2017.
[35] Batuwita, R., & Palade, V., "FSVM-CIL: Fuzzy Support Vector Machines for Class Imbalance Learning", IEEE Trans. Fuzzy Syst., vol. 18, №3, pp. 558–571, Jun. 2010.
[36] He, H., & Ma, Y., "Imbalanced Learning: Foundations, Algorithms, and Applications. Hoboken", NJ, USA: John Wiley & Sons, Inc., 2013.
[37] Wu, C., Lee, M., Liao, S., & Chang, L.,“Risk Factors of Internet Addiction among Internet Users: An Online Questionnaire Survey", Plos one, vol.10, No.10, pp. 1-10, 2015.