Mining Criminal Networks from Chat Log

作者: Mourad Debbabi , Benjamin C. M. Fung , Farkhund Iqbal

DOI: 10.5555/2457524.2457703

关键词: SpammingAnonymityComputer securityInternet privacyDigital evidencePhishingExploitAgency (sociology)Computer scienceEnforcementLaw enforcement

摘要: Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to conduct illegal activities such as phishing, spamming, cyber predation, threatening, blackmail, drug trafficking. One way fight crime is collect digital evidence from online documents prosecute the court of law. In this paper, we propose a unified framework using data mining natural language processing techniques analyze messages purpose investigation. Our takes chat log confiscated computer input, extracts social networks log, summarizes conversations into topics, identifies information relevant investigation, visualizes knowledge an investigator. To ensure that implemented meets needs law enforcement officers real-life closely collaborate with unit agency Canada. Both feedback experimental results suggest proposed effective

参考文章(17)
Michael Chau, Jennifer Schroeder, Hsinchun Chen, Jennifer Xu, Automated criminal link analysis based on domain knowledge: Research Articles Journal of the Association for Information Science and Technology. ,vol. 58, pp. 842- 855 ,(2007) , 10.1002/ASI.V58:6
Shlomo Hershkop, Salvatore J. Stolfo, Email mining toolkit supporting law enforcement forensic analyses international conference on digital government research. pp. 221- 222 ,(2005) , 10.5555/1065226.1065291
Jeffrey Scott McIllwain, Organized crime: A social network approach Crime Law and Social Change. ,vol. 32, pp. 301- 323 ,(1999) , 10.1023/A:1008354713842
Christopher C. Yang, Nan Liu, Marc Sageman, Analyzing the Terrorist Social Networks with Visualization Tools Intelligence and Security Informatics. pp. 331- 342 ,(2006) , 10.1007/11760146_29
V. A. Yatsko, T. N. Vishnyakov, A method for evaluating modern systems of automatic text summarization Automatic Documentation and Mathematical Linguistics. ,vol. 41, pp. 93- 103 ,(2007) , 10.3103/S0005105507030041
M. E. J. Newman, Stephanie Forrest, Justin Balthrop, Email networks and the spread of computer viruses. Physical Review E. ,vol. 66, pp. 035101- ,(2002) , 10.1103/PHYSREVE.66.035101
Tayfun Kucukyilmaz, B. Barla Cambazoglu, Cevdet Aykanat, Fazli Can, Chat mining: Predicting user and message attributes in computer-mediated communication Information Processing & Management. ,vol. 44, pp. 1448- 1466 ,(2008) , 10.1016/J.IPM.2007.12.009
Nick Pendar, Elements of a National SemanticWeb Infrastructure--Case Study Finland on the Semantic Web international conference on semantic computing. pp. 216- 223 ,(2007) , 10.1109/ICSC.2007.32
Derrick Higgins, Toward Spotting the Pedophile Telling victim from predator in text chats international conference on semantic computing. pp. 235- 241 ,(2007) , 10.1109/ICSC.2007.102