Detecting Criminal Relationships through SOM Visual Analytics

Feature analysis is always beneficial to the detection of anonymous criminals in digital forensics, including people and activities, where vast amount of features extracted from databases are involved. Not all features extracted are continuous or different, some of them are discrete or have the same value with others. We discovered that using visual analytics to select features for forensic investigations is not only improve the analysis time of selection, but can also deeply and obviously display the slight changes of features and criminals and also the relationship between features and criminals in order to find the target with significant difference with others, and also predict the more active features to be used in the future. Experiments show that visual feature analysis can help to catch the desire results quickly and clearly.

[1]  Keith Marzullo,et al.  Computer Forensics in Forensis , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.

[2]  Jay F. Nunamaker,et al.  Multidimensional scaling for group memory visualization , 1999, Decis. Support Syst..

[3]  Ramana Rao,et al.  Laying out and visualizing large trees using a hyperbolic space , 1994, UIST '94.

[4]  Grigorios Tsoumakas,et al.  Multi-Label Classification: An Overview , 2007, Int. J. Data Warehous. Min..

[5]  Ricci S. C. Ieong,et al.  FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..

[6]  Stuart K. Card,et al.  The effects of information scent on visual search in the hyperbolic tree browser , 2003, TCHI.

[7]  Hsinchun Chen,et al.  Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.

[8]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[9]  Steven K. Feiner,et al.  Visual task characterization for automated visual discourse synthesis , 1998, CHI.

[10]  George M. Mohay Technical challenges and directions for digital forensics , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[11]  Keith Marzullo,et al.  Second International Workshop on Systematic Approaches to Digital Forensic Engineering , 2007 .

[12]  Kimmo Hätönen,et al.  A computer host-based user anomaly detection system using the self-organizing map , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[13]  Ryan Hafen,et al.  A Visual Analytics Approach to Understanding Spatiotemporal Hotspots , 2010, IEEE Transactions on Visualization and Computer Graphics.

[14]  Ben Shneiderman,et al.  LifeLines: visualizing personal histories , 1996, CHI.

[15]  M S Olivier,et al.  The use of self-organising maps for anomalous behaviour detection in a digital investigation. , 2006, Forensic science international.

[16]  Golden G. Richard,et al.  Next-generation digital forensics , 2006, CACM.

[17]  S. Lilienfeld,et al.  Identifying Personality Subtypes Based on the Five-Factor Model Dimensions in Male Prisoners , 2014, International journal of offender therapy and comparative criminology.

[18]  Geoff Holmes,et al.  Classifier chains for multi-label classification , 2009, Machine Learning.

[19]  John Stasko,et al.  Jigsaw: supporting investigative analysis through interactive visualization , 2008 .

[20]  Michael Lewis,et al.  Evaluating visualizations: using a taxonomic guide , 2000, Int. J. Hum. Comput. Stud..

[21]  Yang Xiang,et al.  Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list , 2005, Decis. Support Syst..

[22]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Heikki Mannila,et al.  Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.

[24]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[25]  Teuvo Kohonen,et al.  The self-organizing map , 1990, Neurocomputing.

[26]  Teuvo Kohonen,et al.  Self-Organization and Associative Memory , 1988 .

[27]  Jarke J. van Wijk,et al.  Interactive visualization of multivariate trajectory data with density maps , 2011, 2011 IEEE Pacific Visualization Symposium.

[28]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[29]  Hsinchun Chen,et al.  Introduction to the special topic issue: Intelligence and security informatics , 2005, J. Assoc. Inf. Sci. Technol..

[30]  Esa Alhoniemi,et al.  Clustering of the self-organizing map , 2000, IEEE Trans. Neural Networks Learn. Syst..

[31]  Peter Eades,et al.  Journal of Graph Algorithms and Applications Navigating Clustered Graphs Using Force-directed Methods , 2022 .

[32]  Andreas Rauber,et al.  The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data , 2002, IEEE Trans. Neural Networks.

[33]  Shawn Ostermann,et al.  Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.

[34]  R. Ostman Handbook of Visual Analysis , 2002 .

[35]  Nicole Beebe,et al.  Dealing with Terabyte Data Sets in Digital Investigations , 2005 .