期刊文献+

基于个性特征仿真邮件分析系统挖掘犯罪网络核心 被引量:19

Mining Key Members of Crime Networks Based on Personality Trait Simulation Email Analysis System
下载PDF
导出
摘要 数据挖掘应用于犯罪集团或恐怖组织社会网络分析是一种新兴的研究方法,国内外在分析犯罪和恐怖组织之间通信行为方面的研究工作亟待深入.为了模拟社会网络中个体利用电子邮件进行通信的规律,设计了一种基于个性特征的仿真邮件分析系统MEP,提出一种利用个性特征判别矩阵计算个性特征矢量各个维度权重的新方法,借助符合用户个性特征的正态分布模型模拟真实的邮件通信行为.为了挖掘犯罪网络的核心成员,提出了一种基于社会网络分析挖掘犯罪组织核心成员的算法CNKM(Crime Network Key Membermining),并利用时间序列分析方法对邮件的收发规律进行深入分析,发现异常通信事件.实验证明了该文提出的仿真邮件分析系统的有效性和实用性,模拟邮件通信的平均误差小于10%,并验证了CNKM算法的有效性. It is a new paradigm to apply data mining technologies to analyze the crime groups and terrorist social networks, there is little work being done on analyzing the communication behavior of criminal and terrorist groups. This paper designed a simulation email system based on personality trait dimensions, called MEP, to model the email users' traffic behavior, proposed a new approach of computing the weight of each dimension in a personality trait vector by using personality trait judge matrix, and simulated the real-world email communication behavior based on normal distribution model satisfying users' personality trait. This paper proposed a social network analysis based algorithm called CNKM (Crime Network Key Member mining) to mine key members of a crime group, and employed time-series analysis techniques to discover the email sending and receiving rules in order to detect the abnormal communication cases. The experimental results show the efficiency and usability of the simulation email analysis system, the average simulation error is less than 10%, and demonstrate that CNKM is efficient.
出处 《计算机学报》 EI CSCD 北大核心 2008年第10期1795-1803,共9页 Chinese Journal of Computers
基金 国家自然科学基金(60773169) 国家“十一五”科技支撑计划项目基金(2006BAI05A01) 四川省青年软件创新工程(2007AA0032,2007AA0028) 四川省青年科技基金(08ZG026-16)资助~~
关键词 数据挖掘 个性特征 仿真 邮件分析系统 社会网络分析 data mining personality trait simulation email analysis system social network analysis
  • 相关文献

参考文献15

  • 1Berkowitz B D, Goodman A E. Best Truth.. Intelligence in the Information Age. New Haven: Yale University Press, 2000
  • 2Fayyad U M, Uthurusamy R. Evolving data mining into solutions for insights. Communications of the ACM, 2002, 45 (8) : 28-31
  • 3Lim M J, Negnevitsky M, Hartmett J. Personality trait based simulation model of the e-mail system. International Journal of Network Security, 2006, 3(2) : 164-182
  • 4Xu J J, Chen Hsinchun. CrimeNet Explorer: A framework for criminal network knowledge discovery. ACM Transactions on Information Systems, 2005, 23(2): 202-226
  • 5Krebs V E. Mapping networks of terrorist cells. Connections, 2002, 24(3): 43-52
  • 6Dombroski Matthew J, Carley Kathleen M. NETEST: Estimating a terrorist networkrs structure. Computational and Mathematical Organization Theory, 2002, 8(3): 235-241
  • 7Qiao Shao-Jie, Tang Chang-Jie, Peng Jing, Fan Hong-Jian, Xiang Yong. VCCM Mining: mining virtual community core members based on gene expression programming//Proceedings of the Workshop on Intelligence and Security Informaties 2006. Singapore, 2006:133-138
  • 8乔少杰 唐常杰 于中华 等.基于属性筛选支持向量机挖掘虚拟社团结构[J].计算机科学,2005,32(7):208-208.
  • 9Stolfo S J, Hershkop S, Wang Ke, Nimeskern O, Flu ChiaWei. A behavior-based approach to securing email systems. Computer Networks Security, Lecture Notes in Computer Science 2776, 2003:57-81
  • 10Stolfo S J, Hershkop S, Wang Ke, Nimeskern O, Hu ChiaWei. Behavior profiling of email. Intelligence and Security Informaties, Lecture Notes in Computer Science 2665, 2003 : 74-90

二级参考文献15

  • 1陈守煜.系统模糊决策理论与应用[M].大连:大连理工大学出版社,1993..
  • 2Gray Dessler. Human Resource Managerment.New Jersey Prentice Hall,1999.
  • 3萧呜政.人员测评与选拔.上海:复旦大学出版社,2005.
  • 4Saaty T L. The Analytic Hierarchy Process. New York:McGraw-Hill Company, 1980.
  • 5乔少杰 唐常杰 于中华 等.基于属性筛选支持向量机挖掘虚拟社团结构[J].计算机科学,2005,32(7):208-208.
  • 6Stolfo S J, Hershkop S, Wang K, Nimeskern O, Hu C W. A Behavior-based Approach to Securing Email Systems. Math. Methods, Models and Architectures for Comp. Networks Security,2003
  • 7de Vel O, et al. Mining E-Mail Content for Author Identification Forensics. SIGMOD Record, 2001,30 (4) : 55-64
  • 8Li Y, Somayaji A. Securing Email Archives through User Modeling. ACSAC, 2005. 547-556
  • 9Lim M J H, Negnevitsky M, Hartnett J. Personality Trait Based Simulation Model of the E-mail System. International Journal of Network Security, 2006,3(2) :164-182
  • 10Borum R. Psychology of terrorism. Tampa: University of South Florida, 2004

共引文献33

同被引文献269

引证文献19

二级引证文献191

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部