Secure interoperation for effective data mining in border control and homeland security applications

Our NSF funded project aims at providing decision makers with the ability to extract and fuse information from multiple, hetertgeneous sources in response to a query while operating under a decentralized security administration. Our motivation comes from US Customs, which embarked on a major modernization initiative of its Information Technology systems. Drawing in data from Customs trade systems, targeting inspectors review manifest information as well as strategic and tactical intelligence to determine "high-risk" shipments and containers. This entails a considerable level of communication and data sharing between various government agencies. Based on the idea of "Smart Borders", the system will utilize data available from different agencies, ports and customs divisions to supplement the profiling by targeting towards anomalies, and detect various flags raised by non-conforming shipments or abnormal behavior of inbound cargos and raise a combination of alerts. The output of this project would ideally enhance the security aspect of the Automated Commercial Environment (ACE) system by incorporating the concept of semantic interoperability, anomaly detection and subsequent spatial and geographical visualization of information that can help Customs inspectors make better decisions.

[1]  Vijayalakshmi Atluri,et al.  Collusion Set Detection Through Outlier Discovery , 2005, ISI.

[2]  Robert L. Grossman,et al.  GenIc: A Single-Pass Generalized Incremental Algorithm for Clustering , 2004, SDM.

[3]  Rey Koslowski REAL CHALLENGES FOR VIRTUAL BORDERS , 2005 .

[4]  Vijayalakshmi Atluri,et al.  A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions , 2004, IICIS.

[5]  Vijayalakshmi Atluri,et al.  LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows , 2005, SAC '05.

[6]  Dallas D. Owens Beyond the U.S. War on Terrorism: Comparing Domestic Legal Remedies to an International Dilemma , 2005 .

[7]  Robert L. Grossman,et al.  Real Time Change Detection and Alerts from Highway Traffic Data , 2005, ACM/IEEE SC 2005 Conference (SC'05).

[8]  Vijayalakshmi Atluri,et al.  Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets , 2004, SAC '04.

[9]  Vijayalakshmi Atluri,et al.  Supporting conditional delegation in secure workflow management systems , 2005, SACMAT '05.

[10]  Vijayalakshmi Atluri,et al.  Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations , 2004, DG.O.

[11]  R. Grossman,et al.  Graph-theoretic scagnostics , 2005, IEEE Symposium on Information Visualization, 2005. INFOVIS 2005..

[12]  Vijayalakshmi Atluri,et al.  Automatic Enforcement of Access Control Policies Among Dynamic Coalitions , 2004, ICDCIT.

[13]  Vasileios Hatzivassiloglou,et al.  An Automatic Method for Constructing Domain-Specific Ontology Resources , 2004, LREC.

[14]  Vijayalakshmi Atluri,et al.  FS/sup 3/: a random walk based free-form spatial scan statistic for anomalous window detection , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[15]  Tao Lin,et al.  DM-AMS: employing data mining techniques for alert management , 2005, DG.O.

[16]  Vijayalakshmi Atluri,et al.  An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies , 2005, ICISS.

[17]  Rey Koslowski,et al.  International Cooperation to Create Smart Borders , 2004 .

[18]  Vijayalakshmi Atluri,et al.  A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions , 2005, DBSec.

[19]  Rey Koslowski International Cooperation on Electronic Advanced Passenger Information Transfer and Passport Biometrics , 2004 .