Using Data Mining Techniques for Detecting Terror - Related Activities on the Web


Using Data Mining Techniques for Detecting Terror - Related Activities on the Web

C.Saranraj, V.Murali

C.Saranraj, V.Murali "Using Data Mining Techniques for Detecting Terror - Related Activities on the Web" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | PCIT-15 , December 2015, URL: http://www.ijtrd.com/papers/IJTRD1325.pdf

An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (‘profile’) of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command- based intrusion detection system

Data Mining, User Modeling, Terrorist Trend Detection, Anomaly Detection, Activity Monitoring


Special Issue | PCIT-15 , December 2015

2394-9333

IJTRD1325
pompy wtryskowe|cheap huarache shoes| cheap jordans|cheap jordans|cheap air max| cheap sneaker cheap nfl jerseys|cheap air jordanscheap jordan shoes
cheap wholesale jordans