Open Access Open Access  Restricted Access Subscription or Fee Access

Detecting Terror Activities on Web Using Data Mining Techniques

P. Sumathi, Dr. R. Manicka Chezian

Abstract


An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (‗profile‘) of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command-based intrusion detection system

Keywords


User Modeling, Anomaly Detection, Terrorist Trend Detection, Activity Monitoring.

Full Text:

PDF

References


Thuraisingham, B., ―Web Data Mining Technologies and Their Applications in Business Intelligence and Counter-terrorism‖, CRC Press, FL, 2003.

Lazarevic, A., et al., ―Data Mining for Computer Security Applications‖, Tutorial Proc. IEEE Data Mining Conference, 2005.

Thuraisingham B., ―Database and Applications Security‖, CRC Press, 2005..

Khan, L., Awad, M. and Thuraisingham, B. ―A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering‖, The VLDB Journal: ACM/Springer-Verlag, 16(1) 2007.

Thuraisingham, B., ―Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges‖, Kluwer, MA 2004 (Editors: V. Kumar et al).

Global Terrorism Database, http://www.start.umd.edu/gtd/, Retreived on 05/02/2012..

Christine Dartigue, Hyun Ik Jang, and Wenjun Zeng, ‖ A New Data-Mining Based Approach for Network Intrusion Detection‖, IEEE 2009, Proc. of the seventh annual communication Networks and Services Research conference.

H. Chen, J. Qin, E. Reid, Y. Zhou, and M. Sageman, Terrorism Informatics – Knowledge Management and Data Mining for Homeland Security. Springer, 2008, ch. Case Study of Jihad on the Web.

McAndrew, D Structural Analysis of Criminal Networks. Social Psychology of Crime Groups, Teams, and Networks, Offender Profiling Series, III. L. Allison.

Kennedy, L. W., Lunn, C. M.: Developing a Foundation for Policy Relevant Terrorism Research in Criminology (2003)


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.