Investigative Data Mining for Security and Criminal Detection

Investigative Data Mining for Security and Criminal Detection

von: Jesus Mena

Elsevier Trade Monographs, 2002

ISBN: 9780080509389 , 469 Seiten

Format: PDF, OL

Kopierschutz: DRM

Windows PC,Mac OSX Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 60,95 EUR

Mehr zum Inhalt

Investigative Data Mining for Security and Criminal Detection


 

Cover

1

Copyright Page

7

Contents

10

Introduction

16

Chapter 1. Precrime Data Mining

18

1.1 Behavioral Profiling

18

1.2 Rivers of Scraps

19

1.3 Data Mining

20

1.4 Investigative Data Warehousing

21

1.5 Link Analysis

22

1.6 Software Agents

23

1.7 Text Mining

25

1.8 Neural Networks

26

1.9 Machine Learning

28

1.10 Precrime

31

1.11 September 11, 2001

32

1.12 Criminal Analysis and Data Mining

32

1.13 Profiling via Pattern Recognition

36

1.14 Calibrating Crime

39

1.15 Clustering Burglars: A Case Study

41

1.16 The Future

54

1.17 Bibliography

55

Chapter 2. Investigative Data Warehousing

56

2.1 Relevant Data

56

2.2 Data Testing

57

2.3 The Data Warehouse

57

2.4 Demographic Data

59

2.5 Real Estate and Auto Data

63

2.6 Credit Data

63

2.7 Criminal Data

64

2.8 Government Data

72

2.9 Internet Data

72

2.10 XML

76

2.11 Data Preparation

78

2.12 Interrogating the Data

80

2.13 Data Integration

81

2.14 Security and Privacy

82

2.15 ChoicePoint: A Case Study

83

2.16 Tools for Data Preparation

85

2.17 Standardizing Criminal Data

89

2.18 Bibliography

91

Chapter 3. Link Analysis: Visualizing Associations

92

3.1 How Link Analysis Works

92

3.2 What Can Link Analysis Do?

92

3.3 What Is Link Analysis?

93

3.4 Using Link Analysis Networks

94

3.5 Fighting Wireless Fraud with Link Analysis: A Case Study

95

3.6 Types of Link Analysis

97

3.7 Combating Drug Trafficking in Florida with Link Analysis: A Case Study

98

3.8 Link Analysis Applications

99

3.9 Focusing on Money Laundering via Link Analysis: A Case Study

101

3.10 Link Analysis Limitations

102

3.11 Link Analysis Tools

105

3.12 Bibliography

121

Chapter 4. Intelligent Agents: Software Detectives

124

4.1 What Can Agents Do?

124

4.2 What Is an Agent?

125

4.3 Agent Features

126

4.4 Why Are Agents Important?

128

4.5 Open Sources Agents

129

4.6 Secured Sources Agents

130

4.7 How Agents Work

130

4.8 How Agents Reason

131

4.9 Intelligent Agents

133

4.10 A Bio-Surveillance Agent: A Case Study

134

4.11 Data Mining Agents

137

4.12 Agents Tools

138

4.13 Bibliography

140

Chapter 5. Text Mining: Clustering Concepts

142

5.1 What Is Text Mining?

142

5.2 How Does Text Mining Work?

143

5.3 Text Mining Applications

144

5.4 Searching for Clues in Aviation Crashes: A Case Study

145

5.5 Clustering News Stories: A Case Study

147

5.6 Text Mining for Deception

149

5.7 Text Mining Threats

155

5.8 Text Mining Tools

158

5.9 Bibliography

174

Chapter 6. Neural Networks: Classifying Patterns

176

6.1 What Do Neural Networks Do?

176

6.2 What Is a Neural Network?

177

6.3 How Do Neural Networks Work?

178

6.4 Types of Network Architectures

179

6.5 Using Neural Networks

180

6.6 Why Use Neural Networks?

181

6.7 Attrasoft Facial Recognition Classifications System: A Demonstration

182

6.8 Chicago Internal Affairs Uses Neural Network: A Case Study

184

6.9 Clustering Border Smugglers with a SOM: A Demonstration

186

6.10 Neural Network Chromatogram Retrieval System: A Case Study

189

6.11 Neural Network Investigative Applications

195

6.12 Modus Operandi Modeling of Group Offending: A Case Study

196

6.13 False Positives

212

6.14 Neural Network Tools

213

6.15 Bibliography

221

Chapter 7. Machine Learning: Developing Profiles

222

7.1 What Is Machine Learning?

222

7.2 How Machine Learning Works

223

7.3 Decision Trees

224

7.4 Rules Predicting Crime

225

7.5 Machine Learning at the Border: A Case Study

227

7.6 Extrapolating Military Data: A Case Study

229

7.7 Detecting Suspicious Government Financial Transactions: A Case Study

230

7.8 Machine-Learning Criminal Patterns

236

7.9 The Decision Tree Tools

238

7.10 The Rule-Extracting Tools

246

7.11 Machine-Learning Software Suites

250

7.12 Bibliography

265

Chapter 8. NetFraud: A Case Study

266

8.1 Fraud Detection in Real Time

266

8.2 Fraud Migrates On-line

267

8.3 Credit-Card Fraud

267

8.4 The Fraud Profile

268

8.5 The Risk Scores

269

8.6 Transactional Data

270

8.7 Common-Sense Rules

270

8.8 Auction Fraud

271

8.9 NetFraud

273

8.10 Fraud-Detection Services

274

8.11 Building a Fraud-Detection System

275

8.12 Extracting Data Samples

276

8.13 Enhancing the Data

276

8.14 Assembling the Mining Tools

278

8.15 A View of Fraud

278

8.16 Clustering Fraud

279

8.17 Detecting Fraud

281

8.18 NetFraud in the United Kingdom: A Statistical Study

283

8.19 Machine-Learning and Fraud

284

8.20 The Fraud Ensemble

287

8.21 The Outsourcing Option

288

8.22 The Hybrid Solution

289

8.23 Bibliography

290

Chapter 9. Criminal Patterns: Detection Techniques

292

9.1 Patterns and Outliers

292

9.2 Money As Data

293

9.3 Financial Crime MOs

294

9.4 Money Laundering

296

9.5 Insurance Crimes

298

9.6 Death Claims That Did Not Add Up: A Case Study

304

9.7 Telecommunications Crime MOs

305

9.8 Identity Crimes

308

9.9 A Data Mining Methodology for Detecting Crimes

310

9.10 Ensemble Mechanisms for Crime Detection

313

9.11 Bibliography

316

Chapter 10. Intrusion Detection: Techniques and Systems

318

10.1 Cybercrimes

318

10.2 Intrusion MOs

319

10.3 Intrusion Patterns

326

10.4 Anomaly Detection

326

10.5 Misuse Detection

327

10.6 Intrusion Detection Systems

327

10.7 Data Mining for Intrusion Detection: A Case Study from the Mitre Corporation

330

10.8 Types of IDSs

335

10.9 Misuse IDSs

335

10.10 Anomaly IDSs

336

10.11 Multiple-Based IDSs

338

10.12 Data Mining IDSs

338

10.13 Advanced IDSs

340

10.14 Forensic Considerations

341

10.15 Early Warning Systems

342

10.16 Internet Resources

343

10.17 Bibliography

343

Chapter 11. The Entity Validation System (EVS): A Conceptual Architecture

344

11.1 The Grid

344

11.2 GRASP

345

11.3 Access Versus Storage

345

11.4 The Virtual Federation

346

11.5 Web Services

347

11.6 The Software Glue

348

11.7 The Envisioned EVS

350

11.8 Needles in Moving Haystacks

351

11.9 Tracking Identities

353

11.10 The AI Apprentice

354

11.11 Incremental Composites

355

11.12 Machine Man

357

11.13 Bibliography

358

Chapter 12. Mapping Crime: Clustering Case Work

360

12.1 Crime Maps

360

12.2 Interactive Crime GIS

362

12.3 Crime Clusters

363

12.4 Modeling the Behavior of Offenders Who Commit Serious Sexual Assaults: A Case Study

365

12.5 Decomposing Signatures Software

380

12.6 Computer Aided Tracking and Characterization of Homicides and Sexual Assaults (CATCH)

381

12.7 Forensic Data Mining

392

12.8 Alien Intelligence

393

12.9 Bibliography

395

A: 1,000 Online Sources for the Investigative Data Miner

396

B: Intrusion Detection Systems (IDS) Products, Services, Freeware, and Projects

432

C: Intrusion Detection Glossary

436

D: Investigative Data Mining Products and Services

448

Index

452