Catálogo de publicaciones - libros
Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings
Hsinchun Chen ; Fei-Yue Wang ; Christopher C. Yang ; Daniel Zeng ; Michael Chau ; Kuiyu Chang (eds.)
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Information Systems Applications (incl. Internet); Information Storage and Retrieval; Computer Communication Networks; Computers and Society; Legal Aspects of Computing; Management of Computing and Information Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-33361-6
ISBN electrónico
978-3-540-33362-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11734628_1
Data Mining for Security Applications
Bhavani M. Thuraisingham
Dr. Bhavani M. Thuraisingham is the invited keynote speaker for WISI 2006. She is a Professor at the Eric Jonsson School of Engineering and Computer Science, University of Texas at Dallas. She is also director of the Cyber Security Research Center and President of Bhavani Security Consulting.
- Keynote Speech | Pp. 1-3
doi: 10.1007/11734628_2
Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity
Jialun Qin; Yilu Zhou; Edna Reid; Guanpi Lai; Hsinchun Chen
Terrorists and extremists have become mainstream exploiters of the Internet beyond routine communication operations and dramatically increased their own ability to influence the outside world. Although this alternate side of the Internet, referred to as the “Dark Web,” has recently received extensive government and media attention, the terrorists/extremists’ Internet usage is still under-researched because of the lack of systematic Dark Web content collection and analysis methodologies. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents. We also propose a framework called the Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, media richness, and Web interactivity. Using the proposed methodology, we collected and examined more than 200,000 multimedia Web documents created by 86 Middle Eastern multi-lingual terrorist/extremist organizations. In our comparison of terrorist/extremist Web sites to U.S. government Web sites, we found that terrorists/extremist groups exhibited similar levels of Web knowledge as U.S. government agencies. We also found that the terrorists/extremist groups are as effective as the U.S. government agencies in terms of supporting communications and interaction using Web technologies. Based on our case study results, we believe that the DWAS is an effective framework to analyze the technical sophistication of terrorist/extremist groups’ Internet usage and our Dark Web analysis methodology could contribute to an evidence-based understanding of the applications of Web technologies in the global terrorism phenomena.
- Web and Text Mining for Terrorism Informatics | Pp. 4-15
doi: 10.1007/11734628_3
Multi-lingual Detection of Terrorist Content on the Web
Mark Last; Alex Markov; Abraham Kandel
Since the web is increasingly used by terrorist organizations for propaganda, disinformation, and other purposes, the ability to automatically detect terrorist-related content in multiple languages can be extremely useful. In this paper we describe a new, classification-based approach to multi-lingual detection of terrorist documents. The proposed approach builds upon the recently developed graph-based web document representation model combined with the popular C4.5 decision-tree classification algorithm. Evaluation is performed on a collection of 648 web documents in Arabic language. The results demonstrate that documents downloaded from several known terrorist sites can be reliably discriminated from the content of Arabic news reports using a simple decision tree.
- Web and Text Mining for Terrorism Informatics | Pp. 16-30
doi: 10.1007/11734628_4
INEXT: An Investigative Search Tool for Knowledge Extraction
Zhen Sun; Ee-Peng Lim
In this paper, we present an investigative search tool called INEXT for searching documents relevant to some terrorism related information seeking tasks. Given a set of seed entities, INEXT conducts information extraction on the documents, and ranks them based on the amount of novel entities and relations they contain. With users interacting with INEXT throughout the search process, documents are re-ranked to identify other relevant documents based on revised document relevance scores. In this paper, we present the overall system architecture and its component modules including the named entity recognition module, entity co-reference module, domain entity and relation extraction module, document ranking module, and entity and relation annotation module. These modules are designed to address the different sub-problems in the entire search process.
- Web and Text Mining for Terrorism Informatics | Pp. 31-37
doi: 10.1007/11734628_5
Cybercrime in Taiwan – An Analysis of Suspect Records
WenYuan Jen; Weiping Chang; Shihchieh Chou
This paper explores the increasing number of cybercrime cases in Taiwan and examines the demographic characteristics of the criminals responsible for the criminal activity. The report is based upon data taken from the Criminal Investigation Bureau of Taiwan cybercrime database over the interval of 1999 through 2004. The paper defines cybercrime, addresses cybercrime case statistics and examines profiles of the suspects’ characteristics. The findings show that the top five categories of crime committed over the past six years are sex trading or sex trading on the Internet, Internet fraud, larceny, cyber piracy and cyber pornography. As for the suspects’ characteristics, the findings show that 81.1% were male; 45.5% had some senior high school education exposure; 63.1% acted independently; 23.7% were currently enrolled students; and 29.1% were in the 18-23 age bracket which was the majority group. Finally, this paper proposes four recommendations to governments, society, schools, and researchers to reduce cycbercrime.
- Cybercrime Analysis | Pp. 38-48
doi: 10.1007/11734628_6
Analysis of Computer Crime Characteristics in Taiwan
You-lu Liao; Cynthia Tsai
This study is intended to uncover the characteristics of computer crimes happening in Taiwan. Applying frequency distribution analysis to the 165 cases collected from the authorities concerned, we find some interesting facts with respect to the crimes’ properties. First, regarding the crimes’ features, a majority of the crimes were related to transmission of pornography and unauthorized copying of proprietary works. Most of them took place at residences. The illegal acts, mainly for profit, usually continued until they were detected. As to the criminals, most of them were male, young, unemployed and college-educated. They tended to commit the crime alone, possessed no prior records and mostly resided in urban areas. Some of them were disabled people, which could be attributed to their difficulties of being employed. The number of cases reported and investigated was increasing, yet, due to certain practical problems, such as the police agency’s limited capability over the offenses or judicial systems’ huge workload, a Funnel Effect emerged in the meantime, resulting in the loss of some cases in each processing phase. In addition, there was a propensity for the judicial system to impose lenient punishment on the violators, e.g. probation and financial penalty instead of imprisonment.
- Cybercrime Analysis | Pp. 49-57
doi: 10.1007/11734628_7
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination
Tang Jun
Outlier detection is a key element for intelligent financial surveillance systems which intend to identify fraud and money laundering by discovering unusual customer behaviour pattern. The detection procedures generally fall into two categories: comparing every transaction against its account history and further more, comparing against a peer group to determine if the behavior is unusual. The later approach shows particular merits in efficiently extracting suspicious transaction and reducing false positive rate. Peer group analysis concept is largely dependent on a cross-datasets outlier detection model. In this paper, we propose a cross outlier detection model based on distance definition incorporated with the financial transaction data features. An approximation algorithm accompanied with the model is provided to optimize the computation of the deviation from tested data point to the reference dataset. An experiment based on real bank data blended with synthetic outlier cases shows promising results of our model in reducing false positive rate while enhancing the discriminative rate remarkably.
- Cybercrime Analysis | Pp. 58-65
doi: 10.1007/11734628_8
Detecting Novel Network Attacks with a Data Field
Feng Xie; Shuo Bai
With the increased usage of computer networks, network intrusions have greatly threatened the Internet infrastructures. Traditional signature-based intrusion detection often suffers from an ineffectivity to those previously “unseen” attacks. In this paper, we analyze the network intrusions from a new viewpoint based on data field and propose branch and bound tree to lessen computation complexity. Finally, we evaluated our approach over KDD Cup 1999 data set.
- Network Security | Pp. 66-72
doi: 10.1007/11734628_9
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication
Seong-seob Hwang; Hyoung-joo Lee; Sungzoon Cho
Keystroke dynamics-based authentication (KDA) is to verify a user’s identification using not only the password but also keystroke patterns. The authors have shown in previous research that uniqueness and consistency of keystroke patterns are important factors to authentication accuracy and that they can be improved by employing artificial rhythms and tempo cues. In this paper, we implement the pause strategy and/or auditory cues for KDA and assess their effectiveness using various novelty detectors. Experimental results show that improved uniqueness and consistency lead to enhanced authentication performance, in particular for those users with poor typing ability.
- Network Security | Pp. 73-78
doi: 10.1007/11734628_10
Illegal Intrusion Detection Based on Hidden Information Database
Huizhang Shen; Jidi Zhao; Huanchen Wang
The national information security mainly depends on the security of database. Current database management system provides some security control mechanisms to ensure the data security such as access control and password protection. However, these mechanisms are not sufficient to ensure database security. This research paper presents a pinion-rack encryption/decryption model (P-R model) and its implementation issues using the field of a record from a database as the basic encryption granularity. Based on the P-R model, this paper also presents a technique of hiding concomitant information in the information system, which can be used to detect the intrusion from illegal users. The P-R model can enhance the ability to identify attacks, accelerate encryption/decryption speed, reduce response time and improve real-time efficiency by cutting the length of keys and minimizing the number of necessary encryption operations. This research paper also proposes a “keeping separately and triggering simultaneously” key management strategy to reduce the possibility of modifying sensitive data purposely by legal users.
- Network Security | Pp. 79-84