Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

@inproceedings{Elovici2004UsingDM,
  title={Using Data Mining Techniques for Detecting Terror-Related Activities on the Web},
  author={Yuval Elovici and A. Kandel and Mark Last and Bracha Shapira and Omer Zaafrany},
  year={2004}
}
An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (‘profile’) of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS
14 Citations
23 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 23 references

Al-Qaeda: In Search of the Terror Network that Threatens the World, Thunder’s

  • J. Corbin
  • 2002
Highly Influential
3 Excerpts

Clustering of Web Documents using a Graph Model, to appear in: Web Document Analysis: Challenges and Opportunities

  • A. Schenker, M. Last, H. Bunke, A. Kandel
  • World Scientific
  • 2003
1 Excerpt

CLUTO - A Clustering Toolkit, Release 2.0, University of Minnesota, URL: http://www.users.cs.umn.edu/~karypis/cluto/download.html

  • G. Karypis
  • 2002
2 Excerpts

Terror Groups behind Web encryption, USA Today, URL: http://www.apfn.org/apfn/WTC_why.htm

  • J. Kelley
  • 2002
2 Excerpts

What are the real risks of cyberterrorism?, ZDNet, URL: http://zdnet.com.com/2100-1105-955293.html

  • R. Lemos
  • 2002
1 Excerpt

Internet privacy threatened following terrorist attacks on US, URL: http://www.wsws.org/articles/2001/sep2001/isps24.shtml

  • M. Ingram
  • 2001
1 Excerpt

Similar Papers

Loading similar papers…