Abstract
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
National Strategy for Homeland Security. Office of Homeland Security (2002)
Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in large Databases. In: Proc. of ACM SIGMOD Conference on Management of Data (1993)
Berrar, D., Dubitzky, W., Granzow, M., Eils, R.: Analysis of Gene Expression and Drug Activity Data by Knowledge-Based Association Mining. In: Proc. of Critical Assessment of Microarray Data Analysis Techniques, CAMDA 2001 (2001)
Chen, I.-M.A., Rotem, D.: Integrating Information from Multiple Independently Developed Data Sources. In: Proc. of 7th International Conference on Information and Knowledge Management, Bethesda, Maryland (1998)
Chruch, K.W., Hanks, P.: Word Association Norms, Mutual Information, and Lexicography. Computational Linguistics 16, 22–29 (1990)
Fano, R.M.: Transmission of Information. MIT Press, Cambridge (1961)
Kaza, S., Wang, T., Gowda, H., Chen, H.: Target Vehicle Identification for Border Safety using Mutual Information. In: Proc. of 8th International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria (2005)
Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: Proc. of 7th USENIX Security Symposium (1998)
Magerman, D.M., Marcus, M.P.: Parsing a Natural Language using Mutual Information Statistics. In: Proc. of Eight National Conference on Artificial Intelligence (1990)
Marshall, B., Kaza, S., Xu, J., Atabakhsh, H., Petersen, T., Violette, C., Chen, H.: Cross-Jurisdictional Criminal Activity Networks to Support Border and Transportation Security. In: Proc. of 7th International IEEE Conference on Intelligent Transportation Systems, Washington D.C (2004)
Mobasher, B., Jain, N., Han, E.H., Srivastava, J.: Web mining: Pattern discovery from world wide web transactions. Department of Computer Science, University of Minnesota. Minneapolis. Technical Report (1996)
Ong, T., Chen, H.: Updateable PAT-Tree Approach to Chinese Key Phrase Extraction Using Mutual Information: a Linguistic Foundation for Knowledge Management. In: Proc. of Second Asian Digital Library Conference, Taipei, Taiwan (1999)
Pantel, P., Philpot, A., Hovy, E.: Aligning Database Columns using Mutual Information. In: Proc. of The 6th National Conference on Digital Government Research (dg.o), Atlanta, GA (2005)
Stonebraker, M., Agrawal, R., Dayal, U., Neuhold, E., Reuter, A.: The DBMS Research at Crossroads. In: Proc. of The VLDB Conference, Dublin (1993)
Tao, T., Zhai, C.X., Lu, X., Fang, H.: A study of statistical methods for function prediction of protein motifs. Applied Bioinformatics 3, 115–124 (2004)
Wren, J.D.: Extending the Mutual Information Measure to Rank Inferred Literature Relationships. BMC Bioinformatics 5 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaza, S., Wang, Y., Chen, H. (2006). Suspect Vehicle Identification for Border Safety with Modified Mutual Information. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_27
Download citation
DOI: https://doi.org/10.1007/11760146_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34478-0
Online ISBN: 978-3-540-34479-7
eBook Packages: Computer ScienceComputer Science (R0)