Propose a Framework for Criminal Mining by Web Structure and Content Mining

Anonymous and suitable information always are provided by criminal web data for Law enforcement agencies. The digital data that are used in forensic analysis comprises of pieces of information which are about the accused social networks. Nevertheless, evaluating these pieces of information is a challenging means an operator has to extract the appropriate information from the text in the website manually, after that it finds a connection between different pieces of information and classify them into a database structure. Then, the set is ready to utilize different criminal network analysis tools for test. Therefore, this manual procedure of arranging data for analysis is not efficient because it affected by many errors. Moreover, the quality of achieving analyzed data is related to the expertise and experience of the investigator so the reliability of the tests is not continuous. Actually, the better result is achieved, the more knowledgeable is an operator. The aim of this study is to report the process of exploring the criminal suspects of forensic data analysis that support the reliability gap by offering a framework by utilizing High-level architecture of a scalable universal crawler.

[1]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[2]  SangKeun Lee,et al.  Fractional PageRank Crawler: Prioritizing URLs Efficiently for Crawling Important Pages Early , 2009, DASFAA.

[3]  Mitsuru Ishizuka,et al.  Ranking Companies on the Web Using Social Network Mining , 2009 .

[4]  Michael Sannella,et al.  Constraint satisfaction and debugging for interactive user interfaces , 1994 .

[5]  Sandip Debnath,et al.  Automatic extraction of informative blocks from webpages , 2005, SAC '05.

[6]  Song Ji-hua A Method of Text Classifier for Focused Crawler , 2010 .

[7]  Philip Tavel,et al.  Modeling and Simulation Design , 2011 .

[8]  Bernd Fröhlich,et al.  The cubic mouse: a new device for three-dimensional input , 2000, CHI.

[9]  David B. Skillicorn,et al.  Novel information discovery for intelligence and counterterrorism , 2007, Decis. Support Syst..

[10]  Tobun Dorbin Ng,et al.  Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization , 2007, 2007 IEEE Intelligence and Security Informatics.

[11]  A. Vrij Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice , 2000 .

[12]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[13]  Laura K. Guerrero,et al.  Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .

[14]  Padmini Srinivasan,et al.  Text mining: Generating hypotheses from MEDLINE , 2004, J. Assoc. Inf. Sci. Technol..

[15]  A. Z. Spector,et al.  Achieving application requirements , 1990 .

[16]  Hongyuan Zha,et al.  Probabilistic models for discovering e-communities , 2006, WWW '06.

[17]  Gary Marchionini,et al.  A study on video browsing strategies , 1997 .

[18]  Hamed Taherdoost,et al.  Criminal Network Mining by Web Structure and Content Mining , 2012 .

[19]  Amr M. Youssef,et al.  Mining criminal networks from unstructured text documents , 2012, Digit. Investig..

[20]  Larry L. Peterson,et al.  Reasoning about naming systems , 1993, TOPL.

[21]  George Forman,et al.  An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..

[22]  Rohini K. Srihari,et al.  A Text Mining Model for Hypothesis Generation , 2007, 19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007).

[23]  Hsinchun Chen,et al.  An International Perspective on Fighting Cybercrime , 2003, ISI.

[24]  Ramasamy Uthurusamy,et al.  EVOLVING DATA MINING INTO SOLUTIONS FOR INSIGHTS , 2002 .

[25]  Hong Hua,et al.  A widget framework for augmented interaction in SCAPE , 2003, UIST '03.

[26]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[27]  Yuen-Tak Yu,et al.  A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..

[28]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[29]  Ravinder Singh,et al.  Research on the Application of Web Mining Technique Based on XML for Unstructured Web Data Using LINQ , 2011 .

[30]  David G. Stork,et al.  Pattern Classification , 1973 .

[31]  Junghoo Cho,et al.  RankMass crawler: a crawler with high personalized pagerank coverage guarantee , 2007, VLDB 2007.

[32]  Rohini K. Srihari,et al.  A Text Mining Model for Hypothesis Generation , 2007 .

[33]  Hideaki Takeda,et al.  An integrated method for social network extraction , 2006, WWW '06.

[34]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[35]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .