University of Tasmania
Browse
mjlimAIWAR2005.pdf (977.35 kB)

Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools

Download (977.35 kB)
conference contribution
posted on 2023-05-26, 08:41 authored by Lim, MJH, Negnevitsky, M, Hartnett, J
In defensive information operations, knowing about the actions or behaviour of the adversary is important for countering any attacks posed by the adversary. Obtaining information about the activities and behaviour of criminal or terrorist groups from electronic communication sources, such as e-mail, will be useful given that criminal or terrorists may utilise different electronic communication mediums to contact each of their agents or members. In this paper, we describe the development of an e-mail traffic analyser system for analysing the interactions between different e-mail clients in the e-mail system. We discuss how different visualisation tools are used and how the information provided by such tools would be useful to an intelligence analyst. The use of decision trees for locating 'interesting' e-mail traffic interactions and the type of information revealed via the technique is also described.

History

Pagination

112-124

Publisher

School of Information Systems, Deakin University

Publication status

  • Published

Event title

6th Australian Information Warfare & Security Conference

Event Venue

Geelong, Victoria, Australia

Date of Event (Start Date)

2005-11-24

Date of Event (End Date)

2005-11-25

Rights statement

This paper was awarded the \Best Student Paper\" prize at the AIWAR2005 conference."

Repository Status

  • Open

Usage metrics

    University Of Tasmania

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC