Detecting terrorist activities Presentation on a specialist topic in Data Mining and Text Analytic.

Slides:



Advertisements
Similar presentations
CRITICAL THINKING The Discipline The Skill The Art.
Advertisements

DETECTING TERRORIST ACTIVITIES PRESENTED BY CATHERINE LUMB & ALI CLARKE.
By Klejdi Muca & Stephen Quinn. A method used by companies like IMDB or Netlfix to turn raw data into useful information, for example It helps companies.
Data Mining and Text Analytics By Saima Rahna & Anees Mohammad Quranic Arabic Corpus.
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
UC Berkeley Online System Problem Detection by Mining Console Logs Wei Xu* Ling Huang † Armando Fox* David Patterson* Michael Jordan* *UC Berkeley † Intel.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies.
Machine Learning and Data Mining Course Summary. 2 Outline  Data Mining and Society  Discrimination, Privacy, and Security  Hype Curve  Future Directions.
Jiho Han Ronny (Dowon) Ko.  Objective: automatically generate the summary of review extracting the strength/weakness of the product  Use NLP techniques.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Decision Tree Classifier for Signature Recognition and State Classification in Intrusion Detection IEE591C Presentation Xiangyang Li, Qiang Chen and Yebin.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Data Mining By Jason Baltazar, Phil Cademas, Jillian Latham, Rachel Peeler & Kamila Singh.
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
Advanced Information Technology in Law Enforcement: Challenges and Barriers to Implementation Andreas M. Olligschlaeger, Ph.D. President, TruNorth Data.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.
Where Are the Nuggets in System Audit Data? Wenke Lee College of Computing Georgia Institute of Technology.
CS598CXZ Course Summary ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Page 1 WEB MINING by NINI P SURESH PROJECT CO-ORDINATOR Kavitha Murugeshan.
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
Accurately and Reliably Extracting Data from the Web: A Machine Learning Approach by: Craig A. Knoblock, Kristina Lerman Steven Minton, Ion Muslea Presented.
Introduction to Web Mining Spring What is data mining? Data mining is extraction of useful patterns from data sources, e.g., databases, texts, web,
1 Controversial Issues  Data mining (or simple analysis) on people may come with a profile that would raise controversial issues of  Discrimination 
WebMining Web Mining By- Pawan Singh Piyush Arora Pooja Mansharamani Pramod Singh Praveen Kumar 1.
© 2003 Terry James. All rights reserved 1 The CRM Textbook: customer relationship management training Terry James © 2006 Chapter 12: Analytical.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Data Mining: Potentials and Challenges Rakesh Agrawal IBM Almaden Research Center.
 Fundamentally, data mining is about processing data and identifying patterns and trends in that information so that you can decide or judge.  Data.
Data Mining By Dave Maung.
Integrating Upward Supporting managers and executives.
Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Mining real world data Web data. World Wide Web Hypertext documents –Text –Links Web –billions of documents –authored by millions of diverse people –edited.
Department of Software and Computing Systems Research Group of Language Processing and Information Systems The DLSIUAES Team’s Participation in the TAC.
Exploring in the Weblog Space by Detecting Informative and Affective Articles Xiaochuan Ni, Gui-Rong Xue, Xiao Ling, Yong Yu Shanghai Jiao-Tong University.
Multiplication Facts. 9 6 x 4 = 24 5 x 9 = 45 9 x 6 = 54.
Info Sabanci University start-up company founded in March 2013 by academicians and graduate students from Sabanci University. We develop social media.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Text Information Management ChengXiang Zhai, Tao Tao, Xuehua Shen, Hui Fang, Azadeh Shakery, Jing Jiang.
Multiplication Facts. 2x2 4 8x2 16 4x2 8 3x3.
Multiplication Facts Review: x 1 = 1 10 x 8 =
Spam Detection Kingsley Okeke Nimrat Virk. Everyone hates spams!! Spam s, also known as junk s, are unwanted s sent to numerous recipients.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Sports Market Research. Know Your Customer How do businesses know their customers needs and wants?  Ask them/talking to customers  Surveys  Questionnaires.
Info Start-up company founded by academicians and graduate students from Sabanci University. We offer social media analysis tools and services including.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Multi-Class Sentiment Analysis with Clustering and Score Representation Yan Zhu.
UNIT 8: THINK Critical Thinking Skill Development Analyzing Information Problem Solving.
Paul van Mulbregt Sheera Knecht Jon Yamron Dragon Systems Detection at Dragon Systems.
Verbal listening: Listening.
Multiplication Facts All Facts. 0 x 1 2 x 1 10 x 5.
Research Introduction to the concept of incorporating sources into your own work.
Trends in NL Analysis Jim Critz University of New York in Prague EurOpen.CZ 12 December 2008.
Multiplication Facts.
DATA MINING © Prentice Hall.
ELINA HALONEN FEBRUARY 2014
Multiplication Facts.
Summary Presented by : Aishwarya Deep Shukla
Data Warehouse.
Introduction Data Mining for Business Analytics.
What is Pattern Recognition?
Figure 1-7: Eavesdropping on a Dialog
Multiplication Facts.
Web Mining Department of Computer Science and Engg.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Sentiment Analysis In Student Learning Experience By Obinna Obeleagu
Sentiment Analysis In Student Learning Experience By Obinna Obeleagu
The Format of an Expository Essay vs
Presentation transcript:

Detecting terrorist activities Presentation on a specialist topic in Data Mining and Text Analytic

Summary Definitions Why use it Techniques Conclusion

What It is Terrorists are people who resort to physical/psychological means of pressuring people in response to their own beliefs and opinions This can be for a number of reasons such as political gain, social/global awareness Can be used to set an example. Would you class strike as a form of terrorists activity?

Medium Traditional methods- repeat offenders Social Media Cults and organisations Encrypted Messages

Techniques Keyword/Text extraction Intrusion Detection Vector-Space Model Information Extraction Automatic Text Summaries

Keyword Extraction “Terror” Corpus Multiple Language statistical techniques “Aboutness” of a text or genre Keyword Total/Percentage

Intrusion Detection Monitor/Analyse actions Decision making- Hostile Database of information  Current Systems  Data logs Algorithm  % normal action vs intrusive action

Idea Data mining works best when you're searching for a well- defined profile, a reasonable number of attacks per year and a low cost of false alarms. Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data-mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.

Conclusion Privacy Issues Ambiguity- Text Very Rare Pattern Seeking/ Counting Things Hard to distinguish Further Development needed