Download presentation
Presentation is loading. Please wait.
Published byJayson Merritt Modified over 8 years ago
1
Detecting terrorist activities Presentation on a specialist topic in Data Mining and Text Analytic
2
Summary Definitions Why use it Techniques Conclusion
3
What It is Terrorists are people who resort to physical/psychological means of pressuring people in response to their own beliefs and opinions This can be for a number of reasons such as political gain, social/global awareness Can be used to set an example. Would you class strike as a form of terrorists activity?
4
Medium Traditional methods- repeat offenders Social Media Cults and organisations Encrypted Messages
5
Techniques Keyword/Text extraction Intrusion Detection Vector-Space Model Information Extraction Automatic Text Summaries
6
Keyword Extraction “Terror” Corpus Multiple Language statistical techniques “Aboutness” of a text or genre Keyword Total/Percentage
7
Intrusion Detection Monitor/Analyse actions Decision making- Hostile Database of information Current Systems Data logs Algorithm % normal action vs intrusive action
8
Idea Data mining works best when you're searching for a well- defined profile, a reasonable number of attacks per year and a low cost of false alarms. Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data-mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.
9
Conclusion Privacy Issues Ambiguity- Text Very Rare Pattern Seeking/ Counting Things Hard to distinguish Further Development needed
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.