Analyzing users' web surfing patterns to trace terrorists and criminals

Gabi Kedma, Mordehai Guri, Tom Sela, Yuval Elovici

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Regular users, as well as criminals and terrorists, are using the Internet for various purposes. Today, current Big-Data technology allows law enforcement authorities to create a huge repository that contains all the surfing activity performed by all users over a considerable period of time. Our theoretical exploration suggests that such a repository contains valuable forensic information that may help to pinpoint suspected criminals or terrorists, and in certain cases can even preempt an upcoming criminal act. In this paper, we suggest how Big-Data analytics should be employed to perform such detections. For each user our detection model derives typical surfing patterns that relate to the topics of interest, frequency of accessing the information, when the information is accessed, etc. Significant deviations from those patterns, particularly when coupled with an event of interest (EOI), such as hit and runs or terrorist attacks, may indicate the subject's active involvement in the event. We provide an outline of the model and the related architecture, which may serve as guidelines for future research.

Original languageEnglish
Title of host publicationIEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationBig Data, Emergent Threats, and Decision-Making in Security Informatics
Pages143-145
Number of pages3
DOIs
StatePublished - 9 Sep 2013
Event11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013 - Seattle, WA, United States
Duration: 4 Jun 20137 Jun 2013

Publication series

NameIEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics

Conference

Conference11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013
Country/TerritoryUnited States
CitySeattle, WA
Period4/06/137/06/13

Keywords

  • Big Data
  • Forensic Information
  • Security Analitics
  • User Profiling
  • Web Intelligence

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Fingerprint

Dive into the research topics of 'Analyzing users' web surfing patterns to trace terrorists and criminals'. Together they form a unique fingerprint.

Cite this