Web Analytics for Security Informatics

An enormous volume of security-relevant information is present on the Web, for instance in the content produced each day by millions of bloggers worldwide, but discovering and making sense of these data is very challenging. This paper considers the problem of exploring and analyzing the Web to realize three fundamental objectives: 1.) security-relevant information is covery, 2.) target situational awareness, typically by making (near) real-time inferences concerning events and activities from available observations, and 3.) predictive analysis, to include providing early warning for crises and forming predictions regarding likely outcomes of emerging issues and contemplated interventions. The proposed approach involves collecting and integrating three types of Web data -- textual, relational, and temporal -- to perform assessments and generate insights that would be difficult or impossible to obtain using standard methods. We demonstrate the efficacy of the framework by summarizing a number of successful real-world deployments of the methodology.

[1]  Hila Becker,et al.  Learning similarity metrics for event identification in social media , 2010, WSDM '10.

[2]  Hsinchun Chen,et al.  Intelligence and Security Informatics , 2013, Lecture Notes in Computer Science.

[3]  Tamara G. Kolda,et al.  Tensor Decompositions and Applications , 2009, SIAM Rev..

[4]  Richard Colbaugh,et al.  Detecting emerging topics and trends via predictive analysis of ‘meme’ dynamics , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[5]  Richard Colbaugh,et al.  Predictive analysis for social processes I: Multi-scale hybrid system modeling , 2009, 2009 IEEE Control Applications, (CCA) & Intelligent Control, (ISIC).

[6]  Yuval Shavitt,et al.  A model of Internet topology using k-shell decomposition , 2007, Proceedings of the National Academy of Sciences.

[7]  Matthew Hurst,et al.  Deriving marketing intelligence from online discussion , 2005, KDD '05.

[8]  Eizo Akiyama,et al.  Chaos in learning a simple two-person game , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[9]  Tobun Dorbin Ng,et al.  Analyzing content development and visualizing social interactions in Web forum , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[10]  B. Minasny The Elements of Statistical Learning, Second Edition, Trevor Hastie, Robert Tishirani, Jerome Friedman. (2009), Springer Series in Statistics, ISBN 0172-7397, 745 pp , 2009 .

[11]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[12]  Duncan J. Watts,et al.  Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.

[13]  Eric R. Ziegel,et al.  The Elements of Statistical Learning , 2003, Technometrics.

[14]  M E J Newman,et al.  Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.

[15]  Richard Colbaugh,et al.  Predictability of 'Unpredictable' Cultural Markets , 2010 .

[16]  Jure Leskovec,et al.  Meme-tracking and the dynamics of the news cycle , 2009, KDD.

[17]  D. Snow,et al.  Framing Processes and Social Movements: An Overview and Assessment , 2000 .

[18]  Richard Colbaugh,et al.  Estimating the sentiment of social media content for security informatics applications , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[19]  Prem Melville Social Media Analytics: Channeling the Power of the Blogosphere for Marketing Insight , 2009 .

[20]  Max Planck,et al.  Automatically identifying the sources of large Internet events , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[21]  Richard Colbaugh,et al.  Early warning analysis for social diffusion events , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[22]  Amr M. Youssef,et al.  Towards discovering criminal communities from textual data , 2011, SAC '11.

[23]  Hsinchun Chen,et al.  Uncovering the dark Web: A case study of Jihad on the Web , 2008, J. Assoc. Inf. Sci. Technol..

[24]  Richard Colbaugh,et al.  Proactive defense for evolving cyber threats , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.