TITLE

DOMINANT FEATURES IDENTIFICATION FOR COVERT NODES IN 9/11 ATTACK USING THEIR PROFILE

AUTHOR(S)
Karthika, S.; Kiruthiga, A.; Bose, S.
PUB. DATE
July 2012
SOURCE
International Journal of Network Security & Its Applications;Jul2012, Vol. 4 Issue 4, p93
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node attributes. In this paper an unsupervised framework SoNMine has been developed to identify the key players in 9/11 network using their behavioral profile. The behaviors of nodes are analyzed based on the behavioral profile generated. The key players are identified using the outlier analysis based on the profile and the highly communicating node is concluded to be the most influential person of the covert network. Further, in order to improve the classification of a normal and outlier node, intermediate reference class R is generated. Based on these three classes the most dominating feature set is determined which further helps to accurately justify the outlier nodes.
ACCESSION #
78549209

 

Related Articles

  • Cyberterrorism: The Logic Bomb versus the Truck Bomb. DENNING, DOROTHY E. // Global Dialogue;2000, Vol. 2 Issue 4, p1 

    In this article the author talks about the threat of cyberterrorism in the U.S. It refers to a combination of terrorism and cyberspace under which unlawful acts are carried out against government networks and the information stored within. She believes that cyberterrorists have declared a war...

  • Cyber-terror could be a new and unwelcome feature of 2007, according to experts.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p8 

    The article considers the possible prevalence of cyber-terrorism in 2007. In late December 2006, the U.S. government issued a warning to private financial institutions that Al Qaeda was planning to ruin their databases. The idea of terrorists using the Internet as a medium for attacks is not...

  • Emerging Trends in Cybercrime. Anderson, Wayne // Ethics & Critical Thinking Journal;2009, Vol. 2009 Issue 4, p118 

    The article discusses the emerging trends in cybercrime. It highlights the role of identifying cybercrime trends as it will influence how an organization can prepare for future information technology (IT) security events and incident response. It presents an overview of Russian Business Network,...

  • NEW, SMART TOOLS ADVANCE MONITORING, PROTECT NETWORK. Phifer, Lisa // Information Security;Jul2015, Issue 6, p3 

    The article discusses different ways to employ advanced network security monitoring technologies. Topics covered include the need to effectively identify evolving network threats. Also mentioned is the importance of regularly performing network security monitoring to raise awareness and response...

  • "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE. Brenner, Susan W. // Journal of Criminal Law & Criminology;Winter2007, Vol. 97 Issue 2, p379 

    This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of responding to those threats. First, it divides the process--attribution--into two categories: what-attribution (what...

  • End the phony cyber war. Rid, Thomas // New Scientist;9/7/2013, Vol. 219 Issue 2933, p26 

    In this article the author discusses why cyberwar has never happened and probably never will. He argues that in order for cyberwar to happen, it would have to be violent, instrumental, and political and discusses why none of the world's previous cyberattacks meet the criteria, the risk of...

  • Cyberwarfare.  // Background Information Summaries;5/ 3/2012, p2 

    Cyberwarfare comprises a relatively new national security threat occasioned by the rapid spread of computer technology in both military operations and the civilian economy. U.S. government reports have suggested that China in particular appears to be actively developing capabilities to disrupt...

  • Experts Offer Mix Of Views On Cyber Security Gains. Biesecker, Calvin // Defense Daily;6/15/2011, Vol. 250 Issue 54, p3 

    The article presents the views of several cyber security experts on cyber security gains in the U.S. According to experts' views, there have been gains in the ways the country counters cyber threats but those threats have grown and become more sophisticated. Mike Brown, director for...

  • Modelling Attribution. Guitton, Clement // Proceedings of the European Conference on Information Warfare & ;2013, p91 

    This article posits that attribution is better approached as a process than as a problem. Departing from models for attribution emphasising its technical constraints, the article distinguishes between two distinct attribution processes operating in two different contexts and answering two...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics