Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)

作者: Yuval Elovici , Bracha Shapira , Mark Last , Omer Zaafrany , Menahem Friedman

DOI: 10.1007/11427995_20

关键词:

摘要: The Terrorist Detection System (TDS) is aimed at tracking down suspected terrorists by analyzing the content of information they access. TDS operates in two modes: a training mode and detection mode. During provided with Web pages accessed normal group users computes their typical interests. performs real-time monitoring traffic emanating from monitored users, analyzes accessed, issues an alarm if access not within interests group. In this paper we present advanced version (ATDS), where algorithm was enhanced to improve performance basic system. ATDS implemented evaluated network environment 38 comparing it TDS. Behavior simulated accessing terror related sites. evaluation included also sensitivity analysis calibrating settings parameters maximize its performance. Results are encouraging. outperformed significantly able reach very high rates when optimally tuned.

参考文章(22)
George Karypis, CLUTO - A Clustering Toolkit Defense Technical Information Center. ,(2002) , 10.21236/ADA439508
Hsinchun Chen, Editorial: Intelligence and security informatics: information systems perspective intelligence and security informatics. ,vol. 41, pp. 555- 559 ,(2006) , 10.1016/J.DSS.2004.06.003
Svetlana Symonenko, Elizabeth D Liddy, Ozgur Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey, None, Semantic Analysis for Monitoring Insider Threats intelligence and security informatics. pp. 492- 500 ,(2004) , 10.1007/978-3-540-25952-7_40
Peter Honeyman, Niels Provos, Detecting Steganographic Content on the Internet network and distributed system security symposium. ,(2002)
Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker, Marc Sageman, Hsinchun Chen, Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism intelligence and security informatics. pp. 125- 145 ,(2004) , 10.1007/978-3-540-25952-7_10
H. Frystyk, L. Masinter, J. Mogul, J. Gettys, R. Fielding, P. Leach, T. Berners-Lee, Hypertext Transfer Protocol -- HTTP/1.1 acm conference on hypertext. ,vol. 2068, pp. 1- 162 ,(1997)
Mark Last, Bracha Shapira, Yuval Elovici, Omer Zaafrany, Abraham Kandel, Content-based methodology for anomaly detection on the web atlantic web intelligence conference. pp. 113- 123 ,(2003) , 10.1007/3-540-44831-4_13
Terran Lane, Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection computer and communications security. pp. 150- 158 ,(1998) , 10.1145/288090.288122
Gerard Salton, Christopher Buckley, Term Weighting Approaches in Automatic Text Retrieval Information Processing and Management. ,vol. 24, pp. 323- 328 ,(1988) , 10.1016/0306-4573(88)90021-0