Integrate the data, build warehouses and federations
Develop profiles of terrorists, activities/threats
Mine the data to extract patterns of potential terrorists and predict future activities and targets
Find the “needle in the haystack” - suspicious needles?
Data integrity is important
18. Integrate data sources Clean/ modify data sources Build Profiles of Terrorists and Activities Examine results/ Prune results Report final results Data sources with information about terrorists and terrorist activities Mine the data
Nature of data
Data arriving from sensors and other devices
Continuous data streams
Breaking news, video releases, satellite images
Some critical data may also reside in caches
Rapidly sift through the data and discard unwanted data for later use and analysis (non-real-time data mining)
Data mining techniques need to meet timing constraints
Quality of service (QoS) tradeoffs among timeliness, precision and accuracy
Presentation of results, visualization, real-time alerts and triggers
20. Integrate data sources in real - time Build real - time models Examine Results in Real - time Report final results Data sources with information about terrorists and terrorist activities Mine the data Rapidly sift through data and discard irrelevant data
Huge amounts of surveillance and video data available in the security domain
Analysis is being done off-line usually using “Human Eyes”
Need for tools to aid human analyst ( pointing out areas in video where unusual activity occurs)
Estimate distribution of pixel intensity change
Contrast the event representation of different video sequences to determine if they contain similar semantic event content.
Using manually labeled training video sequences to classify unlabeled video sequences
Law enforcement : Data mining can aid law enforcers in identifying criminal suspects as well as apprehending these criminals by examining trends in location, crime type, habit, and other patterns of behaviors.
Researchers: Data mining can assist researchers by speeding up their data analyzing process; thus, allowing them more time to work on other projects.
The various data mining techniques that have been proposed towards the enhancement of security of different application.
The ways in which data mining has been known to aid the process of Intrusion Detection,firewall,worm detection counter-terrorism and the ways in which the various techniques have been applied and evaluated.
B. Thuraisingham. Managing threats to web databases and cyber systems: Issues, solutions and challenges. In V. Kumar et al, editor, Cyber Security: Threats and Countermeasures. Kluwer
B. Thuraisingham. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, January 2003
F. Bolz et al. The Counterterrorism Handbook: Tactics, Procedures, and Techniques. CRC Press, 2001.