Skip to main content
Erschienen in: Information Systems Frontiers 1/2011

01.03.2011

Computational approaches to suspicion in adversarial settings

verfasst von: David B. Skillicorn

Erschienen in: Information Systems Frontiers | Ausgabe 1/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Intelligence and law enforcement agencies collect large datasets, but have difficulty focusing analyst attention on the most significant records and structures within them. We address this problem using suspicion, which we interpret as relevant anomaly, as the measure associated with data records and individuals. For datasets collected about widespread activities in which the signs of adversarial activity are rare, we suggest ways to build predictive models of suspicion. For datasets collected as the result of lawful interception, we suggest a model of suspicion spreading using the social network implied by the intercepted data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Actually, the connection between an individual and a channel being intercepted is potentially weak—an email address or web browser may be used by a number of people within a home or internet cafe. This further complicates the analysis.
 
Literatur
Zurück zum Zitat Baker, W., & Faulkner, R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58, 837–860.CrossRef Baker, W., & Faulkner, R. (1993). The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review, 58, 837–860.CrossRef
Zurück zum Zitat Bell, T., Witten, I., & Cleary, J. (1989). Modeling for text compression. ACM Computing Surveys, 21(4), 557–591.CrossRef Bell, T., Witten, I., & Cleary, J. (1989). Modeling for text compression. ACM Computing Surveys, 21(4), 557–591.CrossRef
Zurück zum Zitat Bishop, C. (1995). Neural networks for pattern recognition. Oxford University Press. Bishop, C. (1995). Neural networks for pattern recognition. Oxford University Press.
Zurück zum Zitat Dempster, A., Laird, N., & Rubin, D. (1977). Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B, 39, 138. Dempster, A., Laird, N., & Rubin, D. (1977). Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B, 39, 138.
Zurück zum Zitat Dickey, C. (2009). Securing the city. Simon and Schuster. Dickey, C. (2009). Securing the city. Simon and Schuster.
Zurück zum Zitat Dutrisac, J., & Skillicorn, D. (2008a). Hiding clusters in adversarial settings. In 2008 IEEE intelligence and security informatics (pp. 185–187). Dutrisac, J., & Skillicorn, D. (2008a). Hiding clusters in adversarial settings. In 2008 IEEE intelligence and security informatics (pp. 185–187).
Zurück zum Zitat Dutrisac, J., & Skillicorn, D. (2008b). Subverting prediction in adversarial settings. In 2008 IEEE intelligence and security informatics (pp. 19–24). Dutrisac, J., & Skillicorn, D. (2008b). Subverting prediction in adversarial settings. In 2008 IEEE intelligence and security informatics (pp. 19–24).
Zurück zum Zitat Ester, M., Kriegel, H. P., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In 2nd international conference on knowledge discovery and data mining (KDD’96). Portland: AAAI Press. Ester, M., Kriegel, H. P., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In 2nd international conference on knowledge discovery and data mining (KDD’96). Portland: AAAI Press.
Zurück zum Zitat European Parliament (2001). Final report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system). Tech. rep., European Parliament Temporary Committee on the ECHELON Interception System. European Parliament (2001). Final report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system). Tech. rep., European Parliament Temporary Committee on the ECHELON Interception System.
Zurück zum Zitat Golub, G., & van Loan, C. (1996). Matrix computations (3rd ed.). Johns Hopkins University Press. Golub, G., & van Loan, C. (1996). Matrix computations (3rd ed.). Johns Hopkins University Press.
Zurück zum Zitat Jonas, J., & Harper, J. (2006). Effective counterterrorism and the limited role of predictive data mining. Policy Analysis, 584, 1–12. Jonas, J., & Harper, J. (2006). Effective counterterrorism and the limited role of predictive data mining. Policy Analysis, 584, 1–12.
Zurück zum Zitat Kannan, R., Vempala, S., & Vetta, A. (2000). On clusterings: Good, bad and spectral. In Proceedings of the 41st foundations of computer science (FOCS ’00) (p. 367). Kannan, R., Vempala, S., & Vetta, A. (2000). On clusterings: Good, bad and spectral. In Proceedings of the 41st foundations of computer science (FOCS ’00) (p. 367).
Zurück zum Zitat Liben-Nowell, D., & Kleinberg, J. (2003). The link prediction problem for social networks. In Proceedings of the twelfth international conference on information and knowledge management (pp. 556–559). Liben-Nowell, D., & Kleinberg, J. (2003). The link prediction problem for social networks. In Proceedings of the twelfth international conference on information and knowledge management (pp. 556–559).
Zurück zum Zitat MacQueen, J. (1967). Some methods for classification and analysis of multivariate observations. In Proceedings of 5th Berkeley symposium on mathematical statistics and probability (Vol. 1, pp. 281–297). University of California Press. MacQueen, J. (1967). Some methods for classification and analysis of multivariate observations. In Proceedings of 5th Berkeley symposium on mathematical statistics and probability (Vol. 1, pp. 281–297). University of California Press.
Zurück zum Zitat Pietronero, L., Tosattib, E., Tosattib, V., & Vespignani, A. (2001). Explaining the uneven distribution of numbers in nature: The laws of Benford and Zipf. Physica A: Statistical Mechanics and its Applications, 1–2, 297–304.CrossRef Pietronero, L., Tosattib, E., Tosattib, V., & Vespignani, A. (2001). Explaining the uneven distribution of numbers in nature: The laws of Benford and Zipf. Physica A: Statistical Mechanics and its Applications, 1–2, 297–304.CrossRef
Zurück zum Zitat Skillicorn, D. (2006). Social network analysis via matrix decompositions. In R. Popp, & J. Yen (Eds.), Emergent information technologies and enabling policies for counter-terrorism. IEEE press series on computational intelligence (Chap. 19, pp. 367–392). Skillicorn, D. (2006). Social network analysis via matrix decompositions. In R. Popp, & J. Yen (Eds.), Emergent information technologies and enabling policies for counter-terrorism. IEEE press series on computational intelligence (Chap. 19, pp. 367–392).
Zurück zum Zitat Skillicorn, D. (2007). Detecting anomalies in graphs. In 2007 IEEE international conference on intelligence and security informatics (pp. 209–216). Skillicorn, D. (2007). Detecting anomalies in graphs. In 2007 IEEE international conference on intelligence and security informatics (pp. 209–216).
Zurück zum Zitat Tax, D. (2000). One class classification. PhD thesis, Technical University Delft. Tax, D. (2000). One class classification. PhD thesis, Technical University Delft.
Zurück zum Zitat van Meter, K. (2002). Terrorists/liberators: Researching and dealing with adversary social networks. Connections, 24(3), 66–78. van Meter, K. (2002). Terrorists/liberators: Researching and dealing with adversary social networks. Connections, 24(3), 66–78.
Zurück zum Zitat von Luxburg, U. (2006). A tutorial on spectral clustering. Tech. rep. 149, Max Plank Institute for Biological Cybernetics. von Luxburg, U. (2006). A tutorial on spectral clustering. Tech. rep. 149, Max Plank Institute for Biological Cybernetics.
Metadaten
Titel
Computational approaches to suspicion in adversarial settings
verfasst von
David B. Skillicorn
Publikationsdatum
01.03.2011
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 1/2011
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-010-9279-4

Weitere Artikel der Ausgabe 1/2011

Information Systems Frontiers 1/2011 Zur Ausgabe