Abstract
In this paper we show how social networks, implicitly built from communication data, can serve as a basis for suspicious behavior detection from large communications data (landlines and mobile phone calls) provided by communication services providers for criminal investigators following two procedures: lawful interception and data retention. We propose the following contributions: (i) a data model and a set of operators for querying this data in order to extract suspicious behavior and (ii) a user friendly and easy-to-navigate visual representation for communication data with a prototype implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agarwal, A., Rambow, O., Bhardwaj, N.: Predicting interests of people on online social networks. In: IEEE CSE 2009, pp. 735–740. IEEE Computer Society, Washington, DC, USA (2009)
Archambault, D., Munzner, T., Auber, D.: Topolayout: Multilevel graph layout by topological features. IEEE Trans. Vis. Comput. Graph. 13(2), 305–317 (2007)
DeFanti, T.A., Brown, M.D., McCormick, B.H.: Visualization: Expanding scientific and engineering research opportunities. Computer 22(8), 12–25 (1989)
Giannotti, F., Nanni, M., Pedreschi, D., Renso, C., Trasarti, R.: Mining mobility behavior from trajectory data. In: IEEE CSE 2009, pp. 948–951. IEEE Computer Society, Washington, DC, USA (2009)
Gloor, P.A., Krauss, J., Nann, S., Fischbach, K., Schoder, D.: Web science 2.0: Identifying trends through semantic social network analysis. In: IEEE CSE 2009, vol. 4, pp. 215–222 (2009)
Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: WSDM 2010, pp. 241–250. ACM, New York (2010)
Heer, J., Boyd, D.: Vizster: Visualizing online social networks. In: INFOVIS, p. 5 (2005)
Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2001)
Lakshmanan, L.V.S., Subramanian, S.N., Goyal, N., Krishnamurthy, R.: On query spreadsheets. In: ICDE, pp. 134–141 (1998)
Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: WSDM 2010, pp. 251–260. ACM, New York (2010)
Perer, A., Shneiderman, B.: Systematic yet flexible discovery: guiding domain experts through exploratory data analysis. In: IUI, pp. 109–118 (2008)
Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: KDD 2002, pp. 61–70. ACM, New York (2002)
Roth, M., Ben-David, A., Deutscher, D., Flysher, G., Horn, I., Leichtberg, A., Leiser, N., Merom, R., Mattias, Y.: Suggesting friends using the implicit social graph. In: SIG-KDD (2010) (to appear)
Stanley, W., Katherine, F.: Social Network Analysis: Methods and Applications Structural Analysis in the Social Sciences, 1st edn. Cambridge University Press, Cambridge (1994)
Wen, Z., Lin, C.-Y.: On the quality of inferring interests from social neighbors. In: KDD 2010, pp. 373–382. ACM, New York (2010)
Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48(6), 100–107 (2005)
Xu, J.J., Chen, H.: Criminal network analysis and visualization. Commun. ACM 48(6), 100–107 (2005)
Zhan, J., Oommen, B.J., Crisostomo, J.: Anomaly detection in dynamic social systems using weak estimators. In: IEEE CSE 2009, pp. 18–25. IEEE Computer Society, Washington, DC, USA (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bennamane, A., Hacid, H., Ansiaux, A., Cagnati, A. (2011). Visual Analysis of Implicit Social Networks for Suspicious Behavior Detection. In: Yu, J.X., Kim, M.H., Unland, R. (eds) Database Systems for Advanced Applications. DASFAA 2011. Lecture Notes in Computer Science, vol 6588. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20152-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-20152-3_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20151-6
Online ISBN: 978-3-642-20152-3
eBook Packages: Computer ScienceComputer Science (R0)