Fighting Terrorism: Semi-Supervised Outlier Detection of Electrical Power Consumption

Among years of experiences in counter-terrorism investigative practices, it has been found that terrorist organizations and their activities typically exhibit an exceptional demand for electrical power. For example, making tools for criminal purpose such as knives and bombs, or performing underground preaching, concealed gatherings and other illegal activities, might contribute to unusual fluctuation of power consumption. Intriguingly, facilitated by monitoring key knowledgeable personnel behavior, learning anomalies from massive electrical power consumption data helps to timely obtain predictive clues and warnings for fighting terrorism. Along this line, in this paper we propose a semi-supervised approach incorporating power consumption and key personnel monitoring to draw insights on counter-terrorism. Specifically, we: (1) extract features differentiating normal and abnormal power consumption patterns; (2) construct a semi-supervised method, including unsupervised stage to discover suspicious exceptional power consumption from massive data, and supervised stage leveraging key knowledgeable personnel behavior to refine targets; and (3) deploy a prototype system in Xinjiang China, collaborated with local authorities, which practically testifies the interesting association between power consumption and counterterrorism. Besides, experiments demonstrate satisfactory performance of proposed approach. Indeed, the innovation of combining power consumption and key knowledgeable personnel behavior in perceiving terrorism in advance has profound theoretical and practical significance.

[1]  J. C. Dunn,et al.  A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .

[2]  Jerry H. Ratcliffe Intelligence-Led Policing , 2016 .

[3]  Witold Pedrycz,et al.  Anomaly Detection and Characterization in Spatial Time Series Data: A Cluster-Centric Approach , 2014, IEEE Transactions on Fuzzy Systems.

[4]  Ijaz Haider Naqvi,et al.  Methodologies in power systems fault detection and diagnosis , 2014, Energy Systems.

[5]  Elizabeth R. Groff,et al.  The role of neighborhood parks as crime generators , 2012 .

[6]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[7]  Chao Shen,et al.  A review of electric load classification in smart grid environment , 2013 .

[8]  Adam Rose,et al.  Business Interruption Impacts of a Terrorist Attack on the Electric Power System of Los Angeles: Customer Resilience to a Total Blackout , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[9]  Fiorella Lauro,et al.  Fault detection analysis using data mining techniques for a cluster of smart office buildings , 2015, Expert Syst. Appl..

[10]  Fiorella Lauro,et al.  Building Energy Management Through Fault Detection Analysis Using Pattern Recognition Techniques Applied on Residual Neural Networks , 2014, WIVACE.

[11]  Himansu Sekhar Behera,et al.  Fuzzy C-Means (FCM) Clustering Algorithm: A Decade Review from 2000 to 2014 , 2015 .

[12]  Zahir Tari,et al.  Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling , 2013, J. Parallel Distributed Comput..

[13]  Ioannis Lambadaris,et al.  Network traffic anomaly detection using clustering techniques and performance comparison , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[14]  Rama Chellappa,et al.  From sample similarity to ensemble similarity: probabilistic distance measures in reproducing kernel Hilbert space , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  L. Sherman The power few: experimental criminology and the reduction of harm , 2007 .

[16]  Fan Ji An Intelligent Analytical Method of Abnormal Metering Device Based on Power Consumption Information Collection System , 2013 .

[17]  Ian F. Akyildiz,et al.  A survey on wireless sensor networks for smart grid , 2015, Comput. Commun..

[18]  Hiroshi Esaki,et al.  Strip, Bind, and Search: A method for identifying abnormal energy consumption in buildings , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[19]  A. Atiya,et al.  Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.