Advanced SearchSearch Tips
Illegal and Harmful Information Detection Technique Using Combination of Search Words
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Illegal and Harmful Information Detection Technique Using Combination of Search Words
Han, Byeong Woo; Yoon, Ji Won;
  PDF(new window)
Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.
OSINT;Inteligence;illegal drug;Google;Security;Criminal detection;Automatic detection;
 Cited by
Anonymous Declares War On ISIS Following Paris Massacre, The Huffington Post UK, Nov.16.2015

Tekir, S. Open Source Intelligence Analysis: A Methodological Approach. Saarbrucken, Germany: VDM, 2009.

Yoon, Hae Sung, Yun, Min Woo, "Cyberterrorism : Trends and Reponses" Korean Institute of Criminology Research Series (2012): 4-334, 2012

Gerstein, Josh, "NSA: PRISM Stopped NYSE Attack", Politico. Retrieved June 18, 2013.

Meet Prism's little brother: Socmint, wired, Jun.26.2013

Four hours a day every day, people who watch the porn, JoongAng Daily, Nov.08.2015

Clive Best, "Web Mining for Open Source Intelligence," Information Visualisation, 2008. IV'08. 12th , 2015

Best, C. "Challenges in Open Source Intelligence," Intelligence and Security Informatics Conference (EISIC), 2011 European pp. 58-62, 2011

Neri, F., Pettoni, M., "Stalker, A Multilingual Text Mining Search Engine for Open Source Intelligence," Information Visualisation, 2008. IV '08. 12th International Conference pp. 314-320, 2008

Christopher J.Rhodes, "The Use of Open Source Intelligence in the Construction of Covert Social Networks," Counterterrorism and Open Source Intelligence, 2011

Watters, Paul A., and Nigel Phair. "Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA)." Cyberspace Safety and Security. Springer Berlin Heidelberg, pp. 66-76, 2012


Kkokkoma lexical analyzer :

Lee, Sungjick, and Han-joon Kim. "News keyword extraction for topic tracking," Networked Computing and Advanced Information Management, 2008. NCM'08. Fourth International Conference on. Vol. 2. IEEE, 2008.