Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detecting Terror Activities on Web Using Data Mining Techniques


Affiliations
1 School of IT and Science, Dr. G.R.D. College of Science, Coimbatore, India
2 Department of Computer Science, NGM College, Pollachi, India
     

   Subscribe/Renew Journal


An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior ('profile') of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command-based intrusion detection system.

Keywords

User Modeling, Anomaly Detection, Terrorist Trend Detection, Activity Monitoring.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 174

PDF Views: 2




  • Detecting Terror Activities on Web Using Data Mining Techniques

Abstract Views: 174  |  PDF Views: 2

Authors

P. Sumathi
School of IT and Science, Dr. G.R.D. College of Science, Coimbatore, India
R. Manicka Chezian
Department of Computer Science, NGM College, Pollachi, India

Abstract


An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior ('profile') of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command-based intrusion detection system.

Keywords


User Modeling, Anomaly Detection, Terrorist Trend Detection, Activity Monitoring.