Skip to main content

Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research

  • Conference paper
Intelligence and Security Informatics (PAISI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6749))

Included in the following conference series:

Abstract

Trajectory similarity of moving objects resembles path similarity of user click-streams in web usage mining. By analyzing the URL path of each user, we are able to determine paths that are very similar and therefore effective caching strategies can be applied. In recent years, World Wide Web has been increasingly used by terrorists to spread their ideologies and web mining techniques have been used in cyber crime and terrorism research. Analysis of space and time of click stream data to establish web session similarity from historical web access log of dark web will give insights into access pattern of terrorism sites. This paper deals with the variations in applying spatio-temporal similarity measure of moving objects proposed by the authors in PAISI 2010, to web user session trajectories treating spatial similarity as a combination of structural and sequence similarity of web pages. A similarity set formation tool is proposed for web user session trajectories which has applications in mining click stream data for security related matters in dark web environment. The validity of the findings is illustrated by experimental evaluation using a web access log publically available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Banerjee, G.A.: Clickstream clustering using weighted longest common subsequences. In: Proc. of the Workshop on Web Mining, SIAM Conference on Data Mining, Chicago, pp. 158–172 (2009)

    Google Scholar 

  2. Chaofeng, L.: Research on Web Session Clustering. Journal of Software 4(5) (2009)

    Google Scholar 

  3. Weimann, G.: How Modern Terrorism Uses the Internet, United States Institute of Peace, Special Report 116 (2004), http://www.terror.net

  4. Hwang, J.-R., Kang, H.-Y., Li, K.-J.: Searching for Similar Trajectories on Road Networks Using Spatio-temporal Similarity. In: Manolopoulos, Y., Pokorný, J., Sellis, T.K. (eds.) ADBIS 2006. LNCS, vol. 4152, pp. 282–295. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Lee, E., Leets, L.: Persuasive storytelling by hate groups online - Examining its effects on adolescents. American Behavioral Scientist 45, 927–957 (2002)

    Article  Google Scholar 

  6. Abraham, S., Lal, P.S.: Trigger based security alarming scheme for moving objects on road networks. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 92–101. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Abraham, S., Lal, P.S.: Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security. In: Chen, H., Chau, M., Li, S.-h., Urs, S., Srinivasa, S., Wang, G.A. (eds.) PAISI 2010. LNCS, vol. 6122, pp. 31–43. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Shahabi, C., Zarkesh, A., Adibi, J.: Knowledge discovery from users’ web-page navigation. In: Proceedings of the 7th International Workshop on Research Issues in Data Engineering (RIDE 1997) High Performance Database Management for Large-Scale Applications, pp. 20–31. IEEE Computer Society, Washington, DC, USA (1997)

    Chapter  Google Scholar 

  9. Tiakas, E.: Searching for similar trajectories in spatial Networks. J. System Are (2009), doi:10.1016/j.jss.2008.11.832Y

    Google Scholar 

  10. Wang, W., Zaane, O.R.: Clustering Web sessions by sequence alignment. In: Proceedings of the 13th International Workshop on Database and Expert Systems Applications, pp. 394–398. IEEE Computer Society, Washington, DC (2002)

    Chapter  Google Scholar 

  11. Chen, H., Chung, W., Xu, J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework and some examples. Computer 37, 50–54 (2004)

    Article  Google Scholar 

  12. Xu, J., Chen, H., Zhou, Y., Qin, J.: On the Topology of the Dark Web of Terrorist Groups. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 367–376. Springer-Verlag, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abraham, S., Lal, P.S. (2011). Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research. In: Chau, M., Wang, G.A., Zheng, X., Chen, H., Zeng, D., Mao, W. (eds) Intelligence and Security Informatics. PAISI 2011. Lecture Notes in Computer Science, vol 6749. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22039-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22039-5_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22038-8

  • Online ISBN: 978-3-642-22039-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics