DocumentCode :
2883046
Title :
Identifying threatening networks from transactional data
Author :
Hitt, Laura ; McClain, Matt
Author_Institution :
21CT, Inc., Austin, TX, USA
fYear :
2013
fDate :
4-7 June 2013
Firstpage :
267
Lastpage :
267
Abstract :
We present a method for identifying threatening networks from vast amounts of transactional data (source, destination, timestamp). Our approach builds upon 21CT´s patented network discovery algorithm, and analyzes the changes and trends in network activity in response to stimuli (e.g., key events) as a means to expose the adversarial nature of networks. We provide an analyst with a ranking of networks according to suspiciousness and also various graphical depictions of the change in activity patterns and anomaly scores over time. This assists the analyst in identifying networks of interest from among vast amounts of data and enables the analyst to focus time and resources on those networks. By our approach using anomaly detection, it is not necessary to have an a priori determination of what behavior constitutes a threat. We present results of our capability on real operational data that contains ground truth. Within this dataset are thirteen detected networks, four of which are known to be threatening. There are three key events in this dataset: the arrival of the U.S. Marines to the region, the removal of a key threatening leader, and the raid of an insurgent´s home. Our results indicate that threatening networks conduct communications activity differently than non-threatening networks in response to key events and our approach is able to capture these differences with compelling accuracy, sensitivity, and specificity.
Keywords :
data mining; pattern recognition; principal component analysis; social sciences computing; transaction processing; US Marines arrival; activity pattern change; anomaly detection; anomaly score; insurgent home raid; key threatening leader; network activity change; network activity trend; network discovery algorithm; principal component analysis; suspiciousness; threatening network identification; transactional data; Accuracy; Algorithm design and analysis; Market research; Principal component analysis; Sensitivity; Social network services; Vectors; anomaly detection; behavior patterns; computational social science; graph analysis; social network analysis; threat detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4673-6214-6
Type :
conf
DOI :
10.1109/ISI.2013.6578835
Filename :
6578835
Link To Document :
بازگشت