网络组织中的信息保障与威胁识别

Terrill L. Frantz, Kathleen M. Carley
{"title":"网络组织中的信息保障与威胁识别","authors":"Terrill L. Frantz, Kathleen M. Carley","doi":"10.1109/CISDA.2009.5356532","DOIUrl":null,"url":null,"abstract":"We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Information assurances and threat identification in networked organizations\",\"authors\":\"Terrill L. Frantz, Kathleen M. Carley\",\"doi\":\"10.1109/CISDA.2009.5356532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.\",\"PeriodicalId\":6407,\"journal\":{\"name\":\"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications\",\"volume\":\"24 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISDA.2009.5356532\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISDA.2009.5356532","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

我们提出了一份关于控制实验的简要报告,该实验为参与威胁识别的面向网络的防御分析师提供了有价值的统计数据。这些统计数据估计了顶级中心参与者发现的准确性,这些发现来自通常在现实世界数据集中发现的关系数据,例如在分布式、隐蔽组织中收集的数据。我们的实验涉及有四种类型数据错误的蜂窝社交网络:缺失链接、缺失参与者、额外链接和额外参与者。我们从网络中心性的四个传统度量(度、中间度、接近度和特征向量)的角度提供了顶级威胁识别的统计结果。我们的实验结果提供了观测数据所表明的top-1和top-3行动者的准确性的统计估计。利用这些统计数据,可以提供可靠性的定量指示,以及从关系网络数据中得出的秘密组织领导的国防情报估计。我们提供了为本实验创建的特定情况的查找表,从中可以粗略地估计其他条件。这项工作对业务分析人员和此类分析的消费者具有高度的实际意义,特别是在恐怖主义网络和毒品贩运领域。这项工作也为开发其他网络相关的更复杂的可靠性估计奠定了基础,分析人员的分析任务-从更广泛的关键角色识别任务到评估中心性度量本身的统计可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Information assurances and threat identification in networked organizations
We present a brief report on a controlled experiment that provides valuable statistics to network-oriented defence analysts involved in threat identification. These statistics estimate the accuracy of the top-central actor findings that have been derived from relational data classically found in real-world datasets, such as those collected on distributed, covert organizations. Our experiment involved cellular social-networks with four types of data error: missing links, missing actors, extra links, and extra actors. We provide statistical results for top threat identification from the perspective of four traditional measures of network centrality: degree, betweenness, closeness and eigenvector. The results from our experiment provide a statistical estimate of the accuracy of the top-1 and top-3 actors as indicated by the observed data. Using these statistics a quantitative indication of reliability can be provided along with defence intelligence estimates of covert-organization leadership derived from relational network data. We provide lookup tables for the specific situations created for this experiment, from which other conditions may be loosely estimated. This work has highly practical implications for operational analysts and consumers of such analyses, particularly in the terrorist network and drug-trafficking domains. This work also lays the groundwork for developing more intricate estimates of reliability for other network-related, analytic tasks of analysts — from more extensive key-actor identification tasks to assessing the statistical reliability of the centrality measures in and of themselves.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evolving spiking neural networks: A novel growth algorithm corrects the teacher Emitter geolocation using low-accuracy direction-finding sensors Secure two and multi-party association rule mining Passive multitarget tracking using transmitters of opportunity Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1