Graph-Based Analysis of Nuclear Smuggling Data

被引:1
作者
Cook, Diane [1 ]
Holder, Lawrence [1 ]
Thompson, Sandy [2 ]
Whitney, Paul [2 ]
Chilton, Lawrence [2 ]
机构
[1] Washington State Univ, Pullman, WA 99164 USA
[2] Pacific Northwest Natl Lab, Richland, WA USA
关键词
Nuclear smuggling; data mining; graph representation; pattern discovery;
D O I
10.1080/19361610903176310
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Much of the data that is collected and analyzed today is structural, consisting not only of entities but also of relationships between the entities. As a result, analysis applications rely on automated structural data mining approaches to find patterns and concepts of interest. This ability to analyze structural data has become a particular challenge in many security-related domains. In these domains, focusing on the relationships between entities in the data is critical to detect important underlying patterns. In this study we apply structural data mining techniques to automate analysis of nuclear smuggling data. In particular, we choose to model the data as a graph and use graph-based relational learning to identify patterns and concepts of interest in the data. In this article, we identify the analysis questions that are of importance to security analysts and describe the knowledge representation and data mining approach that we adopt for this challenge. We analyze the results using the Russian nuclear smuggling event database.
引用
收藏
页码:501 / 517
页数:17
相关论文
共 34 条
[1]  
[Anonymous], ACM SIGKDD EXPLORATI
[2]   The anatomy of a large-scale hypertextual Web search engine [J].
Brin, S ;
Page, L .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7) :107-117
[3]  
Chen HC, 2005, IEEE INTELL SYST, V20, P12
[4]   Graph-based data mining [J].
Cook, DJ ;
Holder, LB .
IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 2000, 15 (02) :32-+
[5]  
Csardi G., 2006, P INT C COMPL SYST
[6]  
Domingos P., 2001, KDD-2001. Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P57, DOI 10.1145/502512.502525
[7]   Anomaly detection in data represented as graphs [J].
Eberle, William ;
Holder, Lawrence .
INTELLIGENT DATA ANALYSIS, 2007, 11 (06) :663-689
[8]  
FLAKE GW, 2002, IEEE COMPUT, V35, P66
[9]  
Fu T., 2008, P IEEE INT C INT SEC
[10]  
GARTNER T, 2006, MINING GRAPH DATA