Intelligent Data Analytics for Terror Threat Prediction - Architectures, Methodologies, Techniques and Applications

Author:   SK Pani ,  Sanjay Kumar Singh ,  Lalit Garg ,  Ram Bilas Pachori
Publisher:   John Wiley & Sons Inc
ISBN:  

9781119711094


Pages:   352
Publication Date:   09 February 2021
Format:   Hardback
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Our Price $427.50 Quantity:  
Add to Cart

Share |

Intelligent Data Analytics for Terror Threat Prediction - Architectures, Methodologies, Techniques and Applications


Add your own review!

Overview

Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis. This book provides innovative insights that will help obtain interventions to undertake emerging dynamic scenarios of criminal activities. Furthermore, it presents emerging issues, challenges and management strategies in public safety and crime control development across various domains. The book will play a vital role in improvising human life to a great extent. Researchers and practitioners working in the fields of data mining, machine learning and artificial intelligence will greatly benefit from this book, which will be a good addition to the state-of-the-art approaches collected for intelligent data analytics. It will also be very beneficial for those who are new to the field and need to quickly become acquainted with the best performing methods. With this book they will be able to compare different approaches and carry forward their research in the most important areas of this field, which has a direct impact on the betterment of human life by maintaining the security of our society. No other book is currently on the market which provides such a good collection of state-of-the-art methods for intelligent data analytics-based models for terror threat prediction, as intelligent data analytics is a newly emerging field and research in data mining and machine learning is still in the early stage of development.

Full Product Details

Author:   SK Pani ,  Sanjay Kumar Singh ,  Lalit Garg ,  Ram Bilas Pachori
Publisher:   John Wiley & Sons Inc
Imprint:   John Wiley & Sons Inc
Dimensions:   Width: 15.30cm , Height: 2.40cm , Length: 24.50cm
Weight:   0.612kg
ISBN:  

9781119711094


ISBN 10:   1119711096
Pages:   352
Publication Date:   09 February 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Table of Contents

Preface xv 1 Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media 1 Ravi Kishore Devarapalli and Anupam Biswas 1.1 Introduction 2 1.2 Social Networks 4 1.2.1 Types of Social Networks 4 1.3 What is Cyber-Crime? 7 1.3.1 Definition 7 1.3.2 Types of Cyber-Crimes 7 1.3.2.1 Hacking 7 1.3.2.2 Cyber Bullying 7 1.3.2.3 Buying Illegal Things 8 1.3.2.4 Posting Videos of Criminal Activity 8 1.3.3 Cyber-Crimes on Social Networks 8 1.4 Rumor Detection 9 1.4.1 Models 9 1.4.1.1 Naive Bayes Classifier 10 1.4.1.2 Support Vector Machine 13 1.4.2 Combating Misinformation on Instagram 14 1.5 Factors to Detect Rumor Source 15 1.5.1 Network Structure 15 1.5.1.1 Network Topology 16 1.5.1.2 Network Observation 16 1.5.2 Diffusion Models 18 1.5.2.1 SI Model 18 1.5.2.2 SIS Model 19 1.5.2.3 SIR Model 19 1.5.2.4 SIRS Model 20 1.5.3 Centrality Measures 21 1.5.3.1 Degree Centrality 21 1.5.3.2 Closeness Centrality 21 1.5.3.3 Betweenness Centrality 22 1.6 Source Detection in Network 22 1.6.1 Single Source Detection 23 1.6.1.1 Network Observation 23 1.6.1.2 Query-Based Approach 25 1.6.1.3 Anti-Rumor-Based Approach 26 1.6.2 Multiple Source Detection 26 1.7 Conclusion 27 References 28 2 Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction 31 Jaiprakash Narain Dwivedi 2.1 Introduction 32 2.2 Advancement of Internet 33 2.3 Internet of Things (IoT) and Machine to Machine (M2M) Communication 34 2.4 A Definition of Security Frameworks 38 2.5 M2M Devices and Smartphone Technology 39 2.6 Explicit Hazards to M2M Devices Declared by Smartphone Challenges 41 2.7 Security and Privacy Issues in IoT 43 2.7.1 Dynamicity and Heterogeneity 43 2.7.2 Security for Integrated Operational World with Digital World 44 2.7.3 Information Safety with Equipment Security 44 2.7.4 Data Source Information 44 2.7.5 Information Confidentiality 44 2.7.6 Trust Arrangement 44 2.8 Protection in Machine to Machine Communication 48 2.9 Use Cases for M2M Portability 52 2.10 Conclusion 53 References 54 3 Crime Predictive Model Using Big Data Analytics 57 Hemanta Kumar Bhuyan and Subhendu Kumar Pani 3.1 Introduction 58 3.1.1 Geographic Information System (GIS) 59 3.2 Crime Data Mining 60 3.2.1 Different Methods for Crime Data Analysis 62 3.3 Visual Data Analysis 63 3.4 Technological Analysis 65 3.4.1 Hadoop and MapReduce 65 3.4.1.1 Hadoop Distributed File System (HDFS) 65 3.4.1.2 MapReduce 65 3.4.2 Hive 67 3.4.2.1 Analysis of Crime Data using Hive 67 3.4.2.2 Data Analytic Module With Hive 68 3.4.3 Sqoop 68 3.4.3.1 Pre-Processing and Sqoop 68 3.4.3.2 Data Migration Module With Sqoop 68 3.4.3.3 Partitioning 68 3.4.3.4 Bucketing 68 3.4.3.5 R-Tool Analyse Crime Data 69 3.4.3.6 Correlation Matrix 69 3.5 Big Data Framework 69 3.6 Architecture for Crime Technical Model 72 3.7 Challenges 73 3.8 Conclusions 74 References 75 4 The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks 79 Sushobhan Majumdar 4.1 Introduction 80 4.2 Database and Methods 81 4.3 Discussion and Analysis 82 4.4 Role of Remote Sensing and GIS 83 4.5 Cartographic Model 83 4.5.1 Spatial Data Management 85 4.5.2 Battlefield Management 85 4.5.3 Terrain Analysis 86 4.6 Mapping Techniques Used for Defense Purposes 87 4.7 Naval Operations 88 4.7.1 Air Operations 89 4.7.2 GIS Potential in Military 89 4.8 Future Sphere of GIS in Military Science 89 4.8.1 Defense Site Management 90 4.8.2 Spatial Data Management 90 4.8.3 Intelligence Capability Approach 90 4.8.4 Data Converts Into Information 90 4.8.5 Defense Estate Management 91 4.9 Terrain Evolution 91 4.9.1 Problems Regarding the Uses of Remote Sensing and GIS 91 4.9.2 Recommendations 92 4.10 Conclusion 92 References 93 5 Text Mining for Secure Cyber Space 95 Supriya Raheja and Geetika Munjal 5.1 Introduction 95 5.2 Literature Review 97 5.2.1 Text Mining With Latent Semantic Analysis 100 5.3 Latent Semantic Analysis 101 5.4 Proposed Work 102 5.5 Detailed Work Flow of Proposed Approach 104 5.5.1 Defining the Stop Words 106 5.5.2 Stemming 107 5.5.3 Proposed Algorithm: A Hybrid Approach 109 5.6 Results and Discussion 111 5.6.1 Analysis Using Hybrid Approach 111 5.7 Conclusion 115 References 115 6 Analyses on Artificial Intelligence Framework to Detect Crime Pattern 119 R. Arshath Raja, N. Yuvaraj and N.V. Kousik 6.1 Introduction 120 6.2 Related Works 121 6.3 Proposed Clustering for Detecting Crimes 122 6.3.1 Data Pre-Processing 123 6.3.2 Object-Oriented Model 124 6.3.3 MCML Classification 124 6.3.4 GAA 124 6.3.5 Consensus Clustering 124 6.4 Performance Evaluation 124 6.4.1 Precision 125 6.4.2 Sensitivity 125 6.4.3 Specificity 131 6.4.4 Accuracy 131 6.5 Conclusions 131 References 132 7 A Biometric Technology-Based Framework for Tackling and Preventing Crimes 133 Ebrahim A.M. Alrahawe, Vikas T. Humbe and G.N. Shinde 7.1 Introduction 134 7.2 Biometrics 135 7.2.1 Biometric Systems Technologies 137 7.2.2 Biometric Recognition Framework 141 7.2.3 Biometric Applications/Usages 142 7.3 Surveillance Systems (CCTV) 144 7.3.1 CCTV Goals 146 7.3.2 CCTV Processes 146 7.3.3 Fusion of Data From Multiple Cameras 149 7.3.4 Expanding the Use of CCTV 149 7.3.5 CCTV Effectiveness 150 7.3.6 CCTV Limitations 150 7.3.7 Privacy and CCTV 150 7.4 Legality to Surveillance and Biometrics vs. Privacy and Human Rights 151 7.5 Proposed Work (Biometric-Based CCTV System) 153 7.5.1 Biometric Surveillance System 154 7.5.1.1 System Component and Flow Diagram 154 7.5.2 Framework 156 7.6 Conclusion 158 References 159 8 Rule-Based Approach for Botnet Behavior Analysis 161 Supriya Raheja, Geetika Munjal, Jyoti Jangra and Rakesh Garg 8.1 Introduction 161 8.2 State-of-the-Art 163 8.3 Bots and Botnets 166 8.3.1 Botnet Life Cycle 166 8.3.2 Botnet Detection Techniques 167 8.3.3 Communication Architecture 168 8.4 Methodology 171 8.5 Results and Analysis 175 8.6 Conclusion and Future Scope 177 References 177 9 Securing Biometric Framework with Cryptanalysis 181 Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma and Martin Sagayam 9.1 Introduction 182 9.2 Basics of Biometric Systems 184 9.2.1 Face 185 9.2.2 Hand Geometry 186 9.2.3 Fingerprint 187 9.2.4 Voice Detection 187 9.2.5 Iris 188 9.2.6 Signature 189 9.2.7 Keystrokes 189 9.3 Biometric Variance 192 9.3.1 Inconsistent Presentation 192 9.3.2 Unreproducible Presentation 192 9.3.3 Fault Signal/Representational Accession 193 9.4 Performance of Biometric System 193 9.5 Justification of Biometric System 195 9.5.1 Authentication ( Is this individual really the authenticate user or not? ) 195 9.5.2 Recognition ( Is this individual in the database? ) 196 9.5.3 Concealing ( Is this a needed person? ) 196 9.6 Assaults on a Biometric System 196 9.6.1 Zero Effort Attacks 197 9.6.2 Adversary Attacks 198 9.6.2.1 Circumvention 198 9.6.2.2 Coercion 198 9.6.2.3 Repudiation 198 9.6.2.4 DoB (Denial of Benefit) 199 9.6.2.5 Collusion 199 9.7 Biometric Cryptanalysis: The Fuzzy Vault Scheme 199 9.8 Conclusion & Future Work 203 References 205 10 The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates 209 Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal and G.N. Shinde 10.1 Introduction: An Overview of Big Data and Cyber Crime 210 10.2 Techniques for the Analysis of BigData 211 10.3 Important Big Data Security Techniques 216 10.4 Conclusion 219 References 219 11 Crime Pattern Detection Using Data Mining 221 Dipalika Das and Maya Nayak 11.1 Introduction 221 11.2 Related Work 222 11.3 Methods and Procedures 224 11.4 System Analysis 227 11.5 Analysis Model and Architectural Design 230 11.6 Several Criminal Analysis Methods in Use 233 11.7 Conclusion and Future Work 235 References 235 12 Attacks and Security Measures in Wireless Sensor Network 237 Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan and Aditya Khamparia 12.1 Introduction 238 12.2 Layered Architecture of WSN 239 12.2.1 Physical Layer 239 12.2.2 Data Link Layer 239 12.2.3 Network Layer 240 12.2.4 Transport Layer 240 12.2.5 Application Layer 241 12.3 Security Threats on Different Layers in WSN 241 12.3.1 Threats on Physical Layer 241 12.3.1.1 Eavesdropping Attack 241 12.3.1.2 Jamming Attack 242 12.3.1.3 Imperil or Compromised Node Attack 242 12.3.1.4 Replication Node Attack 242 12.3.2 Threats on Data Link Layer 242 12.3.2.1 Collision Attack 243 12.3.2.2 Denial of Service (DoS) Attack 243 12.3.2.3 Intelligent Jamming Attack 243 12.3.3 Threats on Network Layer 243 12.3.3.1 Sybil Attack 243 12.3.3.2 Gray Hole Attack 243 12.3.3.3 Sink Hole Attack 244 12.3.3.4 Hello Flooding Attack 244 12.3.3.5 Spoofing Attack 244 12.3.3.6 Replay Attack 244 12.3.3.7 Black Hole Attack 244 12.3.3.8 Worm Hole Attack 245 12.3.4 Threats on Transport Layer 245 12.3.4.1 De-Synchronization Attack 245 12.3.4.2 Flooding Attack 245 12.3.5 Threats on Application Layer 245 12.3.5.1 Malicious Code Attack 245 12.3.5.2 Attack on Reliability 246 12.3.6 Threats on Multiple Layer 246 12.3.6.1 Man-in-the-Middle Attack 246 12.3.6.2 Jamming Attack 246 12.3.6.3 Dos Attack 246 12.4 Threats Detection at Various Layers in WSN 246 12.4.1 Threat Detection on Physical Layer 247 12.4.1.1 Compromised Node Attack 247 12.4.1.2 Replication Node Attack 247 12.4.2 Threat Detection on Data Link Layer 247 12.4.2.1 Denial of Service Attack 247 12.4.3 Threat Detection on Network Layer 248 12.4.3.1 Black Hole Attack 248 12.4.3.2 Worm Hole Attack 248 12.4.3.3 Hello Flooding Attack 249 12.4.3.4 Sybil Attack 249 12.4.3.5 Gray Hole Attack 250 12.4.3.6 Sink Hole Attack 250 12.4.4 Threat Detection on the Transport Layer 251 12.4.4.1 Flooding Attack 251 12.4.5 Threat Detection on Multiple Layers 251 12.4.5.1 Jamming Attack 251 12.5 Various Parameters for Security Data Collection in WSN 252 12.5.1 Parameters for Security of Information Collection 252 12.5.1.1 Information Grade 252 12.5.1.2 Efficacy and Proficiency 253 12.5.1.3 Reliability Properties 253 12.5.1.4 Information Fidelity 253 12.5.1.5 Information Isolation 254 12.5.2 Attack Detection Standards in WSN 254 12.5.2.1 Precision 254 12.5.2.2 Germane 255 12.5.2.3 Extensibility 255 12.5.2.4 Identifiability 255 12.5.2.5 Fault Forbearance 255 12.6 Different Security Schemes in WSN 256 12.6.1 Clustering-Based Scheme 256 12.6.2 Cryptography-Based Scheme 256 12.6.3 Cross-Checking-Based Scheme 256 12.6.4 Overhearing-Based Scheme 257 12.6.5 Acknowledgement-Based Scheme 257 12.6.6 Trust-Based Scheme 257 12.6.7 Sequence Number Threshold-Based Scheme 258 12.6.8 Intrusion Detection System-Based Scheme 258 12.6.9 Cross-Layer Collaboration-Based Scheme 258 12.7 Conclusion 264 References 264 13 Large Sensing Data Flows Using Cryptic Techniques 269 Hemanta Kumar Bhuyan 13.1 Introduction 270 13.2 Data Flow Management 271 13.2.1 Data Flow Processing 271 13.2.2 Stream Security 272 13.2.3 Data Privacy and Data Reliability 272 13.2.3.1 Security Protocol 272 13.3 Design of Big Data Stream 273 13.3.1 Data Stream System Architecture 273 13.3.1.1 Intrusion Detection Systems (IDS) 274 13.3.2 Malicious Model 275 13.3.3 Threat Approaches for Attack Models 276 13.4 Utilization of Security Methods 277 13.4.1 System Setup 278 13.4.2 Re-Keying 279 13.4.3 New Node Authentication 279 13.4.4 Cryptic Techniques 280 13.5 Analysis of Security on Attack 280 13.6 Artificial Intelligence Techniques for Cyber Crimes 281 13.6.1 Cyber Crime Activities 282 13.6.2 Artificial Intelligence for Intrusion Detection 282 13.6.3 Features of an IDPS 284 13.7 Conclusions 284 References 285 14 Cyber-Crime Prevention Methodology 291 Chandra Sekhar Biswal and Subhendu Kumar Pani 14.1 Introduction 292 14.1.1 Evolution of Cyber Crime 294 14.1.2 Cybercrime can be Broadly Defined as Two Types 296 14.1.3 Potential Vulnerable Sectors of Cybercrime 296 14.2 Credit Card Frauds and Skimming 297 14.2.1 Matrimony Fraud 297 14.2.2 Juice Jacking 298 14.2.3 Technicality Behind Juice Jacking 299 14.3 Hacking Over Public WiFi or the MITM Attacks 299 14.3.1 Phishing 300 14.3.2 Vishing/Smishing 302 14.3.3 Session Hijacking 303 14.3.4 Weak Session Token Generation/Predictable Session Token Generation 304 14.3.5 IP Spoofing 304 14.3.6 Cross-Site Scripting (XSS) Attack 305 14.4 SQLi Injection 306 14.5 Denial of Service Attack 307 14.6 Dark Web and Deep Web Technologies 309 14.6.1 The Deep Web 309 14.6.2 The Dark Web 310 14.7 Conclusion 311 References 312 Index 313

Reviews

Author Information

Subhendu Kumar Pani received his PhD from Utkal University Odisha, India in 2013. He is a professor in the Department of Computer Science & Engineering, Orissa Engineering College (OEC), Bhubaneswar, India. He has published more than 50 articles in international journals, authored 5 books and edited 2 volumes. Sanjay Kumar Singh is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Varanasi. He has published more than 130 international publications, 4 edited books and 2 patents. Lalit Garg received his PhD from the University of Ulster, UK in Computing and Information Engineering. He is a senior lecturer in Computer Information Systems, University of Malta, Malta. Ram Bilas Pachori received his PhD degree in Electrical Engineering from the Indian Institute of Technology (IIT) Kanpur, India in 2008. He is now a professor of Electrical Engineering, IIT Indore, India. He has more than 170 publications which include journal papers, conference papers, books, and book chapters. Xiaobo Zhang obtained his Master of Computer Science, Doctor of Engineering (Control Theory and Control Engineering) and is now working in the Internet of Things Department of Automation, Guangdong University of Technology, China. He has published more than 30 journal articles, edited 3 books, and has applied for more than 40 invention patents and obtained 6 software copyrights.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide
 MDRG Image
Shopping Cart
Your cart is empty
Shopping cart
Mailing List