Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284095
David Zimbra, Hsinchun Chen
This study examines several approaches to sentiment classification in the Dark Web Forum Portal, and opportunities to transfer classifiers and text features across multiple forums to improve scalability and performance. Although sentiment classifiers typically perform poorly when transferred across domains, experimentation reveals the devised approaches offer performance equivalent to the traditional forum-specific approach in classification in an unknown domain. Furthermore, incorporating the text features identified as significant indicators of sentiment in other forums can greatly improve the classification accuracy of the traditional forum-specific approach.
{"title":"Scalable sentiment classification across multiple Dark Web Forums","authors":"David Zimbra, Hsinchun Chen","doi":"10.1109/ISI.2012.6284095","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284095","url":null,"abstract":"This study examines several approaches to sentiment classification in the Dark Web Forum Portal, and opportunities to transfer classifiers and text features across multiple forums to improve scalability and performance. Although sentiment classifiers typically perform poorly when transferred across domains, experimentation reveals the devised approaches offer performance equivalent to the traditional forum-specific approach in classification in an unknown domain. Furthermore, incorporating the text features identified as significant indicators of sentiment in other forums can greatly improve the classification accuracy of the traditional forum-specific approach.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284288
P. H. Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen
We experimentally evaluated the Dark Web Forum Portal by focusing on user task performance, usability, cognitive processing requirements, and societal benefits. Our results show that the portal performs perform well when compared with a benchmark forum.
{"title":"Evaluating an integrated forum portal for terrorist surveillance and analysis","authors":"P. H. Hu, Xing Wan, Yan Dang, Catherine A. Larson, Hsinchun Chen","doi":"10.1109/ISI.2012.6284288","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284288","url":null,"abstract":"We experimentally evaluated the Dark Web Forum Portal by focusing on user task performance, usability, cognitive processing requirements, and societal benefits. Our results show that the portal performs perform well when compared with a benchmark forum.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284289
Tarique Anwar, M. Abulaish
In this paper, we present a novel agglomerative clustering method to identify cliques in dark Web forums. Considering each post as an individual entity accompanying all the information about its thread, author, time-stamp, etc., we have defined a similarity function to identify similarity between each pair of posts as a blend of their contextual and temporal coherence. The similarity function is employed in the proposed clustering algorithm to group threads into different clusters that are finally presented as individual cliques. The identified cliques are characterized using the homogeneity of posts therein, which also establishes the homogeneity of their authors and threads as well.
{"title":"Identifying cliques in dark web forums - An agglomerative clustering approach","authors":"Tarique Anwar, M. Abulaish","doi":"10.1109/ISI.2012.6284289","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284289","url":null,"abstract":"In this paper, we present a novel agglomerative clustering method to identify cliques in dark Web forums. Considering each post as an individual entity accompanying all the information about its thread, author, time-stamp, etc., we have defined a similarity function to identify similarity between each pair of posts as a blend of their contextual and temporal coherence. The similarity function is employed in the proposed clustering algorithm to group threads into different clusters that are finally presented as individual cliques. The identified cliques are characterized using the homogeneity of posts therein, which also establishes the homogeneity of their authors and threads as well.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"55 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284274
Vladimir Avram, U. Glässer, H. Y. Shahir
Maritime security is critical for many nations to address the vulnerability of their sea lanes, ports and harbours to a variety of threats and illegal activities. With increasing volume of spatiotemporal data, it is ever more problematic to analyze the enormous volume of data in real time. This paper explores a novel approach to representing spatiotemporal data for model-driven methods for detecting patterns of anomalous behaviour in spatiotemporal datasets.
{"title":"Anomaly detection in spatiotemporal data in the maritime domain","authors":"Vladimir Avram, U. Glässer, H. Y. Shahir","doi":"10.1109/ISI.2012.6284274","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284274","url":null,"abstract":"Maritime security is critical for many nations to address the vulnerability of their sea lanes, ports and harbours to a variety of threats and illegal activities. With increasing volume of spatiotemporal data, it is ever more problematic to analyze the enormous volume of data in real time. This paper explores a novel approach to representing spatiotemporal data for model-driven methods for detecting patterns of anomalous behaviour in spatiotemporal datasets.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117047498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284198
S. Ho
The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes. One needs to ensure the privacy of these raw trajectory data and the derived knowledge by not disclosing or releasing them to adversary. In this paper, we propose a practical implementation of a (ε; δ)-differentially private mechanism for moving objects data mining; in particular, we apply it to the frequent location pattern mining algorithm. Experimental results on the real-world GeoLife dataset are used to compare the performance of the (ε; δ)-differential privacy mechanism with the standard ε-differential privacy mechanism.
{"title":"Preserving privacy for moving objects data mining","authors":"S. Ho","doi":"10.1109/ISI.2012.6284198","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284198","url":null,"abstract":"The prevalence of mobile devices with geopositioning capability has resulted in the rapid growth in the amount of moving object trajectories. These data have been collected and analyzed for both commercial (e.g., recommendation system) and security (e.g. surveillance and monitoring system) purposes. One needs to ensure the privacy of these raw trajectory data and the derived knowledge by not disclosing or releasing them to adversary. In this paper, we propose a practical implementation of a (ε; δ)-differentially private mechanism for moving objects data mining; in particular, we apply it to the frequent location pattern mining algorithm. Experimental results on the real-world GeoLife dataset are used to compare the performance of the (ε; δ)-differential privacy mechanism with the standard ε-differential privacy mechanism.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116121191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284313
Yuequn Li, W. Mao, D. Zeng, Luwen Huangfu, Chunyang Liu
Opinion mining has gained increasing attention and shown great practical value in recent years. Existing research on opinion mining mainly focuses on the extraction of lexicon orientation and opinion targets. The explanations of opinions, which are potentially valuable for many applications, are totally ignored. To address this specific research challenge, in this paper, we propose an approach to extract the explanation of reason and/or consequence behind an opinion via learning word pairs and using causal indicators from Chinese online reviews. We also improve our word pair based method by constructing clusters of word paris. Experiments on a Chinese business review corpus show that our method is feasible and effective.
{"title":"Extracting opinion explanations from Chinese online reviews","authors":"Yuequn Li, W. Mao, D. Zeng, Luwen Huangfu, Chunyang Liu","doi":"10.1109/ISI.2012.6284313","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284313","url":null,"abstract":"Opinion mining has gained increasing attention and shown great practical value in recent years. Existing research on opinion mining mainly focuses on the extraction of lexicon orientation and opinion targets. The explanations of opinions, which are potentially valuable for many applications, are totally ignored. To address this specific research challenge, in this paper, we propose an approach to extract the explanation of reason and/or consequence behind an opinion via learning word pairs and using causal indicators from Chinese online reviews. We also improve our word pair based method by constructing clusters of word paris. Experiments on a Chinese business review corpus show that our method is feasible and effective.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117193284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6282648
A. Abbasi, F. Zahedi, Yan Chen
Phishing website-based attacks continue to present significant problems for individual and enterprise-level security, including identity theft, malware, and viruses. While the performance of anti-phishing tools has improved considerably, it is unclear how effective such tools are at protecting users. In this study, an experiment involving over 400 participants was used to evaluate the impact of anti-phishing tools' accuracy on users' ability to avoid phishing threats. Each of the participants was given either a high accuracy (90%) or low accuracy (60%) tool and asked to make various decisions about several legitimate and phishing websites. Experiment results revealed that participants using the high accuracy anti-phishing tool significantly outperformed those using the less accurate tool in their ability to: (1) differentiate legitimate websites from phish; (2) avoid visiting phishing websites; and (3) avoid transacting with phishing websites. However, even users of the high accuracy tool often disregarded its correct recommendations, resulting in users' phish detection rates that were approximately 15% lower than those of the anti-phishing tool used. Consequently, on average, participants visited between 74% and 83% of the phishing websites and were willing to transact with as many as 25% of the phishing websites. Anti-phishing tools were also less effective against one particular type of threat. The results suggest that while the accuracy of anti-phishing tools is a critical factor, reducing the success rates of phishing attacks requires other considerations such as improving tool interface/warning design and enhancing users' knowledge of phishing. Given the prevalence of phishing-based web fraud, the findings have important implications for individual and enterprise security.
{"title":"Impact of anti-phishing tool performance on attack success rates","authors":"A. Abbasi, F. Zahedi, Yan Chen","doi":"10.1109/ISI.2012.6282648","DOIUrl":"https://doi.org/10.1109/ISI.2012.6282648","url":null,"abstract":"Phishing website-based attacks continue to present significant problems for individual and enterprise-level security, including identity theft, malware, and viruses. While the performance of anti-phishing tools has improved considerably, it is unclear how effective such tools are at protecting users. In this study, an experiment involving over 400 participants was used to evaluate the impact of anti-phishing tools' accuracy on users' ability to avoid phishing threats. Each of the participants was given either a high accuracy (90%) or low accuracy (60%) tool and asked to make various decisions about several legitimate and phishing websites. Experiment results revealed that participants using the high accuracy anti-phishing tool significantly outperformed those using the less accurate tool in their ability to: (1) differentiate legitimate websites from phish; (2) avoid visiting phishing websites; and (3) avoid transacting with phishing websites. However, even users of the high accuracy tool often disregarded its correct recommendations, resulting in users' phish detection rates that were approximately 15% lower than those of the anti-phishing tool used. Consequently, on average, participants visited between 74% and 83% of the phishing websites and were willing to transact with as many as 25% of the phishing websites. Anti-phishing tools were also less effective against one particular type of threat. The results suggest that while the accuracy of anti-phishing tools is a critical factor, reducing the success rates of phishing attacks requires other considerations such as improving tool interface/warning design and enhancing users' knowledge of phishing. Given the prevalence of phishing-based web fraud, the findings have important implications for individual and enterprise security.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284309
J. Nunamaker, J. Burgoon, Nathan W. Twyman, J. Proudfoot, Ryan M. Schuetzler, J. Giboney
Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.
{"title":"Establishing a foundation for automated human credibility screening","authors":"J. Nunamaker, J. Burgoon, Nathan W. Twyman, J. Proudfoot, Ryan M. Schuetzler, J. Giboney","doi":"10.1109/ISI.2012.6284309","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284309","url":null,"abstract":"Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6281922
Nguyen Thanh Hung, Do Hoang Giang, W. Ng, Huafei Zhu
Database-as-a-Service is becoming more and more popular for many organizations. Storing data on the cloud can significantly reduce costs in terms of maintenance costs and initial investment costs. But due to data privacy and security concerns, many companies are still reluctant to use outsourced database service. In this paper, we present a solution to protect data privacy on the cloud, at the same time, allowing multiple users accessing the shared database with security assurance.
{"title":"Cloud-enabled data sharing model","authors":"Nguyen Thanh Hung, Do Hoang Giang, W. Ng, Huafei Zhu","doi":"10.1109/ISI.2012.6281922","DOIUrl":"https://doi.org/10.1109/ISI.2012.6281922","url":null,"abstract":"Database-as-a-Service is becoming more and more popular for many organizations. Storing data on the cloud can significantly reduce costs in terms of maintenance costs and initial investment costs. But due to data privacy and security concerns, many companies are still reluctant to use outsourced database service. In this paper, we present a solution to protect data privacy on the cloud, at the same time, allowing multiple users accessing the shared database with security assurance.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126091543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-11DOI: 10.1109/ISI.2012.6284270
Minh Tam Le, J. Sweeney, B. Russett, S. Zucker
Sociopolitical databases provide a rich source of high-dimensional data with hidden spatial-temporal structure; for example countries voting for/against certain UN resolutions is a manifestation of the underlying political alignment among nations. We introduce the notion of diffusion distance as a natural measure in such datasets. and applied diffusion maps to databases of intergovernmental organizations' memberships and UN roll calls. Examination of the embeddings from these data across time reveals interesting historical narratives, suggesting the results serve as a proxy for analysis of security and terrorism datasets.
{"title":"Structural inference in political science datasets","authors":"Minh Tam Le, J. Sweeney, B. Russett, S. Zucker","doi":"10.1109/ISI.2012.6284270","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284270","url":null,"abstract":"Sociopolitical databases provide a rich source of high-dimensional data with hidden spatial-temporal structure; for example countries voting for/against certain UN resolutions is a manifestation of the underlying political alignment among nations. We introduce the notion of diffusion distance as a natural measure in such datasets. and applied diffusion maps to databases of intergovernmental organizations' memberships and UN roll calls. Examination of the embeddings from these data across time reveals interesting historical narratives, suggesting the results serve as a proxy for analysis of security and terrorism datasets.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125384115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}