Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

  title={Using Data Mining Techniques for Detecting Terror-Related Activities on the Web},
  author={Yuval Elovici and A. Kandel and Mark Last and Bracha Shapira and Omer Zaafrany},
An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (‘profile’) of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS
14 Citations
23 References
Similar Papers


Publications referenced by this paper.
Showing 1-10 of 23 references

Al-Qaeda: In Search of the Terror Network that Threatens the World, Thunder’s

  • J. Corbin
  • 2002
Highly Influential
3 Excerpts

Clustering of Web Documents using a Graph Model, to appear in: Web Document Analysis: Challenges and Opportunities

  • A. Schenker, M. Last, H. Bunke, A. Kandel
  • World Scientific
  • 2003
1 Excerpt

CLUTO - A Clustering Toolkit, Release 2.0, University of Minnesota, URL:

  • G. Karypis
  • 2002
2 Excerpts

Terror Groups behind Web encryption, USA Today, URL:

  • J. Kelley
  • 2002
2 Excerpts

What are the real risks of cyberterrorism?, ZDNet, URL:

  • R. Lemos
  • 2002
1 Excerpt

Internet privacy threatened following terrorist attacks on US, URL:

  • M. Ingram
  • 2001
1 Excerpt

Similar Papers

Loading similar papers…