Mining criminal networks from chat log
Document Type
Conference Proceeding
Source of Publication
Proceedings - 2012 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2012
Publication Date
12-1-2012
Abstract
Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to conduct illegal activities such as phishing, spamming, cyber predation, cyber threatening, blackmail, and drug trafficking. One way to fight cyber crime is to collect digital evidence from online documents and to prosecute cyber criminals in the court of law. In this paper, we propose a unified framework using data mining and natural language processing techniques to analyze online messages for the purpose of crime investigation. Our framework takes the chat log from a confiscated computer as input, extracts the social networks from the log, summarizes chat conversations into topics, identifies the information relevant to crime investigation, and visualizes the knowledge for an investigator. To ensure that the implemented framework meets the needs of law enforcement officers in real-life investigation, we closely collaborate with the cyber crime unit of a law enforcement agency in Canada. Both the feedback from the law enforcement officers and experimental results suggest that the proposed chat log mining framework is effective for crime investigation. © 2012 IEEE.
DOI Link
ISBN
9780769548807
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
First Page
332
Last Page
337
Disciplines
Computer Sciences
Keywords
crime investigation, criminal networks, data mining, frequent patterns, topic mining
Scopus ID
Recommended Citation
Iqbal, Farkhund; Fung, Benjamin C.M.; and Debbabi, Mourad, "Mining criminal networks from chat log" (2012). All Works. 2399.
https://zuscholars.zu.ac.ae/works/2399
Indexed in Scopus
yes
Open Access
no