We consider four properties by which intercepted messages can be selected for deeper analysis: their external properties, their content, their authorship, and the mental state of their authors. We argue that, rather than trying to differentiate directly between ‘good’ messages and ‘bad’ messages, it is better to use a two-pronged approach, where a simple detection scheme triggers a reaction in authors of ‘bad’ messages. This reaction is easier to detect than the original difference. We also suggest that differentiation is more effective when it is done for sets of messages, rather than on a message by message basis.
Keywords
- Target Word
- Singular Value Decomposition
- Independent Component Analysis
- Exception Word
- Pointwise Mutual Information
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. Cortes, D. Pregibon, and C. Volinsky. Computational methods for dynamic graphs. Journal of Computational and Graphical Statistics, 12:950--970, 2003.
O. de Vel, A. Anderson, M. Corney, and G. Mohay. Mining {E-mail} content for author identification forensics. SIGMOD Record, 30(4):55--64, December 2001. European Parliament Temporary Committee on the ECHELON Interception System. Final report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), 2001.
SW. Fong, D.B. Skillicorn, and D. Roussinov. Detecting word substitutions in text. IEEE Transactions on Knowledge and Data Engineering, to appear, 2007.
G. Fung. The disputed Federalist papers: SVM and feature selection via concave minimization. In Proceedings of the 2003 Conference on Diversity in Computing, pages 42--46, Atlanta, Georgia, USA, 2003.
D. Gupta, M. Saul, and J. Gilbertson. Evaluation of a deidentification {(De-Id)} software engine to share pathology reports and clinical documents for research. American Journal of Clinical Pathology, 121(2):176--186, February 2004.
R.D. Horn, J.D. Birdwell, and L.W. Leedy. Link discovery tool. In ONDCP/CTAC International Symposium, August 1997.
P.S. Keila and D.B. Skillicorn. Detecting unusual email communication. In CASCON 2005, pages 238--246, 2005.
P.S. Keila and D.B. Skillicorn. Structure in the Enron email dataset. Computational and Mathematical Organization Theory, 11(3):183--199, 2005.
M. Koppel, J. Schler, and K. Zigdon. Automatically determining an anonymous author’s native language. In Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, pages 209--217. Springer-Verlag Lecture Notes in Computer Science LNCS 3495, 2005.
M.L. Newman, J.W. Pennebaker, D.S. Berry, and J.M. Richards. Lying words: Predicting deception from linguistic style. Personality and Social Psychology Bulletin, 29:665--675, 2003.
M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security, 1(1):66--92, November 1998.
D.B. Skillicorn. Beyond keyword filtering for message and conversation detection. In IEEE International Conference on Intelligence and Security Informatics (ISI2005), pages 231--243. Springer-Verlag Lecture Notes in Computer Science LNCS 3495, May 2005.
X. Zhu and R. Rosenfeld. Improving trigram language modeling with the world wide web. In Proceedings of International Conference on Acoustics, Speech, and Signal Processing, 2001., pages 533--536, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Skillicorn, D.B. (2008). Individual and Collective Analysis of Anomalies in Message Traffic. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_20
Download citation
DOI: https://doi.org/10.1007/978-0-387-71613-8_20
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71612-1
Online ISBN: 978-0-387-71613-8
eBook Packages: Business and EconomicsBusiness and Management (R0)