首页> 外文会议>IEEE Aerospace conference >Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
【24h】

Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition

机译:反恐社交网络分析与意图识别的建模与检测技术

获取原文
获取外文期刊封面目录资料

摘要

In this paper, we describe our approach and initial results on modeling, detection, and tracking of terrorist groups and their intents based on multimedia data. While research on automated information extraction from multimedia data has yielded significant progress in areas such as the extraction of entities, links, and events, less progress has been made in the development of automated tools for analyzing the results of information extraction to “connect the dots.” Hence, our Counter-Terror Social Network Analysis and Intent Recognition (CT-SNAIR) work focuses on development of automated techniques and tools for detection and tracking of dynamically-changing terrorist networks as well as recognition of capability and potential intent. In addition to obtaining and working with real data for algorithm development and test, we have a major focus on modeling and simulation of terrorist attacks based on real information about past attacks. We describe the development and application of a new Terror Attack Description Language (TADL), which is used as a basis for modeling and simulation of terrorist attacks. Examples are shown which illustrate the use of TADL and a companion simulator based on a Hidden Markov Model (HMM) structure to generate transactions for attack scenarios drawn from real events. We also describe our techniques for generating realistic background clutter traffic to enable experiments to estimate performance in the presence of a mix of data. An important part of our effort is to produce scenarios and corpora for use in our own research, which can be shared with a community of researchers in this area. We describe our scenario and corpus development, including specific examples from the September 2004 bombing of the Australian embassy in Jakarta and a fictitious scenario which was developed in a prior project for research in social network analysis. The scenarios can be created by subject matter experts using a graphical editing tool. Gi--ven a set of time ordered transactions between actors, we employ social network analysis (SNA) algorithms as a filtering step to divide the actors into distinct communities before determining intent. This helps reduce clutter and enhances the ability to determine activities within a specific group. For modeling and simulation purposes, we generate random networks with structures and properties similar to real-world social networks. Modeling of background traffic is an important step in generating classifiers that can separate harmless activities from suspicious activity. An algorithm for recognition of simulated potential attack scenarios in clutter based on Support Vector Machine (SVM) techniques is presented. We show performance examples, including probability of detection versus probability of false alarm tradeoffs, for a range of system parameters.
机译:在本文中,我们描述了基于多媒体数据对恐怖团体及其意图进行建模,检测和跟踪的方法和初步结果。尽管从多媒体数据中自动提取信息的研究在诸如实体,链接和事件的提取等领域已取得了重大进展,但在用于分析信息提取结果以“连接点”的自动化工具的开发方面却取得了较小的进展。 。”因此,我们的反恐社交网络分析和意图识别(CT-SNAIR)工作致力于开发自动技术和工具,以检测和跟踪动态变化的恐怖网络以及对能力和潜在意图的识别。除了获取和处理真实数据以进行算法开发和测试外,我们还主要关注基于有关过去攻击的真实信息对恐怖袭击进行建模和仿真。我们描述了一种新的恐怖袭击描述语言(TADL)的开发和应用,该语言被用作建模和模拟恐怖袭击的基础。展示了一些示例,这些示例说明了如何使用TADL和基于隐马尔可夫模型(HMM)结构的伴随模拟器为从真实事件中提取的攻击方案生成事务。我们还将描述用于生成实际背景杂波流量的技术,以使实验能够在存在数据混合的情况下估算性能。我们努力的一个重要部分是产生用于我们自己的研究的场景和语料库,并可以与该领域的研究人员共享。我们描述了我们的情景和语料库的发展,包括2004年9月轰炸澳大利亚驻雅加达大使馆的具体例子以及在一个先前的项目中开发的虚拟情景,用于社会网络分析研究。方案专家可以使用图形编辑工具来创建方案。鉴于-参与者之间的一组按时间排序的交易,我们使用社交网络分析(SNA)算法作为过滤步骤,以在确定意图之前将参与者划分为不同的社区。这有助于减少混乱,并增强确定特定组内活动的能力。为了进行建模和仿真,我们生成具有与现实社会网络相似的结构和属性的随机网络。对背景流量进行建模是生成可将无害活动与可疑活动区分开的分类器的重要步骤。提出了一种基于支持向量机(SVM)技术的杂波中模拟攻击场景识别算法。我们显示了一系列系统参数的性能示例,包括检测概率与错误警报权衡的概率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号