首页> 外文期刊>Journal of Information Warfare >Using Data Mining Techniques for Detecting Terror-Related Activities on the Web
【24h】

Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

机译:使用数据挖掘技术来检测Web上与恐怖有关的活动

获取原文
获取原文并翻译 | 示例
       

摘要

An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology' learns the typical behavior ('profile') of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command-based intrusion detection system.
机译:提出了一种创新的基于知识的方法,该方法通过使用Web流量内容作为审核信息来进行恐怖分子检测。所提出的方法通过将数据挖掘算法应用于与恐怖有关的网站的文本内容,来学习恐怖分子的典型行为(“特征”)。系统使用结果概要文件来实时检测涉嫌从事恐怖活动的用户。接收方-运营商特征(ROC)分析表明,该方法可以胜过基于命令的入侵检测系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号