Library Open Repository
Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools
Lim, MJH and Negnevitsky, M and Hartnett, J (2005) Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools. In: 6th Australian Information Warfare & Security Conference, 24 - 25 November 2005, Geelong, Victoria, Australia.
mjlimAIWAR2005...pdf | Download (1MB)
Available under University of Tasmania Standard License.
In defensive information operations, knowing about the actions or behaviour of the adversary is important for countering any attacks posed by the adversary. Obtaining information about the activities and behaviour of criminal or terrorist groups from electronic communication sources, such as e-mail, will be useful given that criminal or terrorists may utilise different electronic communication mediums to contact each of their agents or members. In this paper, we describe the development of an e-mail traffic analyser system for analysing the interactions between different e-mail clients in the e-mail system. We discuss how different visualisation tools are used and how the information provided by such tools would be useful to an intelligence analyst. The use of decision trees for locating 'interesting' e-mail traffic interactions and the type of information revealed via the technique is also described.
|Item Type:||Conference or Workshop Item (Paper)|
|Keywords:||Defensive information operations, e-mail, traffic analysis, visualisation, data mining, decision trees, communication behaviour.|
|Publisher:||School of Information Systems, Deakin University|
|Page Range:||pp. 112-124|
This paper was awarded the "Best Student Paper" prize at the AIWAR2005 conference.
|Date Deposited:||21 Dec 2005|
|Last Modified:||18 Nov 2014 03:10|
|Item Statistics:||View statistics for this item|
Actions (login required)
|Item Control Page|