【24h】

An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification

机译:基于证据聚类的网络恐怖分子细胞拓扑识别框架

获取原文
获取原文并翻译 | 示例

摘要

Nowadays, social networks media are heavily used by cyber terrorist organizations to exchange information, and manage their malicious activities. Effective approaches to understand cyber terrorist organizations structures, working strategies, and operation tactics are required to develop security solutions to prevent their activities. Usually, a terrorist organization includes several sub-groups sharing common proprieties. However, the subgroups may differ in their degree of activities and roles. Hence, understating the topology of a terrorist organization and its operations methods is important to develop efficient prevention solutions. In this paper, we discuss the foundation of an approach for detecting cyber terrorist subgroups, as well as its evaluation and efficiency using data on cyber terrorist groups. The approach is based on an evidential clustering method. In fact, objects (known also as network members) within a cyber terrorist group can be classified into various sub-classes, such as military, finance and local leaders committees. Belief functions are used to describe the membership of nodes to clusters (sub-communities). The efficiency of the proposed approach is demonstrated through a set of clustering results, regarding the classification of cyber terrorist actors and the allocation of the appropriate degree to each member of a given class. Experimental results show the efficiency and the accuracy of our CECM based approach not only in classifying cyber terrorist actors into the aforementioned communities, but also in allocating a degree of membership for each member to each sub-class.
机译:如今,网络恐怖组织大量使用社交网络媒体来交换信息并管理其恶意活动。需要有效的方法来了解网络恐怖组织的结构,工作策略和操作策略,以开发安全解决方案以防止其活动。通常,恐怖组织包括几个拥有共同礼节的小团体。但是,这些亚组的活动程度和角色可能有所不同。因此,低估恐怖组织的拓扑结构及其操作方法对于开发有效的预防解决方案很重要。在本文中,我们讨论了一种用于检测网络恐怖分子子群体的方法的基础,以及使用网络恐怖分子群体的数据进行评估和效率评估的方法。该方法基于证据聚类方法。实际上,网络恐怖组织中的对象(也称为网络成员)可以分为多个子类,例如军事,金融和地方领导人委员会。置信函数用于描述群集(子社区)中节点的成员资格。通过一系列聚类结果证明了该方法的有效性,该聚类结果涉及网络恐怖分子的分类以及对给定类别的每个成员的适当程度的分配。实验结果表明,我们基于CECM的方法的效率和准确性不仅可以将网络恐怖分子分类为上述社区,还可以为每个子类的每个成员分配一定程度的成员资格。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号