Data Mining

Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

ABSTRACT

An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (‘profile’) of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command- based intrusion detection system.

Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools

ABSTRACT

In defensive information operations, knowing about the actions or behaviour of the adversary is important for countering any attacks posed by the adversary. Obtaining information about the activities and behaviour of criminal or terrorist groups from electronic communication sources, such as e-mail, will be useful given that criminal or terrorists may utilise different electronic communication mediums to contact each of their agents or members. In this paper, the development of an e-mail traffic analyser system for analysing the interactions between different e-mail clients in the e-mail system is described. The different visualisation tools used and how the information provided by such tools would be useful to an intelligence analyst are discussed. The use of decision trees for locating ‘unusual’ e-mail traffic interactions and the type of information revealed via the technique is also described.

Automated Categorization of Profiles for Psychological Operations: An Analysis of Data and Text Mining Approaches

ABSTRACT

Influencing one’s adversary has always been an objective in warfare.  To date the majority of psychological influence operations have been geared toward the masses.  A tailored approach of individual targeting is preferred but requires unattainable resources.  This paper investigates whether state-of-the-art data and text mining tools can be used to automate the categorization/segmentation of individual profiles for psychological operations.  Five data and text mining software applications were tested and their results compared with those of a social psychologist.  Using statistical analysis, it was concluded that current data and text mining tools are not mature enough to produce results comparable with those produced by psychologists.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com