Cover image for Machine learning forensics for law enforcement, security, and intelligence
Title:
Machine learning forensics for law enforcement, security, and intelligence
Personal Author:
Publication Information:
Boca Raton, FL. : Taylor & Francis, 2011.
Physical Description:
xii, 337 p. : ill. ; 26 cm.
ISBN:
9781439860694

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010302832 HV8073 M395 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data. To combat this unlawful activity, knowledge about the use of machine learning technology and software is critical. Machine Learning Forensics for Law Enforcement, Security, and Intelligence integrates an assortment of deductive and instructive tools, techniques, and technologies to arm professionals with the tools they need to be prepared and stay ahead of the game.

Step-by-step instructions

The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text extraction, and rule generating software to "interrogate the evidence." This powerful data is indispensable for fraud detection, cybersecurity, competitive counterintelligence, and corporate and litigation investigations. The book also provides step-by-step instructions on how to construct adaptive criminal and fraud detection systems for organizations.

Prediction is the key

Internet activity, email, and wireless communications can be captured, modeled, and deployed in order to anticipate potential cyber attacks and other types of crimes. The successful prediction of human reactions and server actions by quantifying their behaviors is invaluable for pre-empting criminal activity. This volume assists chief information officers, law enforcement personnel, legal and IT professionals, investigators, and competitive intelligence analysts in the strategic planning needed to recognize the patterns of criminal activities in order to predict when and where crimes and intrusions are likely to take place.


Author Notes

Jesús Mena is a former Internal Revenue Service Artificial Intelligence specialist and the author of numerous data mining, web analytics, law enforcement, homeland security, forensic, and marketing books. Mena has also written dozens of articles and consulted with several businesses and governmental agencies. He has over 20 years' experience in expert systems, rule induction, decision trees, neural networks, self-organizing maps, regression, visualization, and machine learning and has worked on data mining projects involving clustering, segmentation, classification, profiling and personalization with government, web, retail, insurance, credit card, financial and healthcare data sets. He has worked, written, and lectured on various behavioral analytics and social networking techniques, personalization mechanisms, web and mobile networks, real-time psychographics, tracking and profiling engines, log analyzing tools, packet sniffers, voice and text recognition software, geolocation and behavioral targeting systems, real-time streaming analytical software, ensemble techniques, and digital fingerprinting.


Table of Contents

Introductionp. ix
The Authorp. xi
Chapter 1 What Is Machine Learning Forensics?p. 1
1.1 Definitionp. 1
1.2 Digital Maps and Models: Strategies and Technologiesp. 2
1.3 Extractive Forensics: Link Analysis and Text Miningp. 3
1.4 Inductive Forensics: Clustering Incidents and Crimesp. 7
1.5 Deductive Forensics: Anticipating Attacks and Precrimep. 10
1.6 Fraud Detection: On the Web, Wireless, and in Real Timep. 21
1.7 Cybersecurity Investigations: Self-Organizing and Evolving Analysesp. 24
1.8 Corporate Counterintelligence: Litigation and Competitive Investigationsp. 28
1.9 A Machine Learning Forensic Worksheetp. 32
Chapter 2 Digital Investigative Maps and Models: Strategies and Techniquesp. 37
2.1 Forensic Strategiesp. 37
2.2 Decompose the Datap. 41
2.3 Criminal Data Sets, Reports, and Networksp. 42
2.4 Real Estate, Auto, and Credit Data Setsp. 45
2.5 Psychographic and Demographic Data Setsp. 46
2.6 Internet Data Setsp. 49
2.7 Deep Packet Inspection (DPI)p. 53
2.8 Designing a Forensic Frameworkp. 56
2.9 Tracking Mechanismsp. 58
2.10 Assembling Data Streamsp. 63
2.11 Forensic Techniquesp. 65
2.12 Investigative Mapsp. 69
2.13 Investigative Modelsp. 72
Chapter 3 Extractive Forensics: Link Analysis and Text Miningp. 77
3.1 Data Extractionp. 77
3.2 Link Analysisp. 80
3.3 Link Analysis Toolsp. 83
3.4 Text Miningp. 96
3.5 Text Mining Toolsp. 98
3.5.1 Online Text Mining Analytics Toolsp. 99
3.5.2 Commercial Text Mining Analytics Softwarep. 99
3.6 From Extraction to Clusteringp. 123
Chapter 4 Inductive Forensics: Clustering Incidents and Crimesp. 125
4.1 Autonomous Forensicsp. 125
4.2 Self-Organizing Mapsp. 129
4.3 Clustering Softwarep. 132
4.3.1 Commercial Clustering Softwarep. 132
4.3.2 Free and Open-Source Clustering Softwarep. 134
4.4 Mapping Incidentsp. 138
4.5 Clustering Crimesp. 141
4.6 From Induction to Deductionp. 154
Chapter 5 Deductive Forensics: Anticipating Attacks and Precrimep. 159
5.1 Artificial Intelligence and Machine Learningp. 159
5.2 Decision Treesp. 160
5.3 Decision Tree Techniquesp. 163
5.4 Rule Generatorsp. 167
5.5 Decision Tree Toolsp. 170
5.5.1 Free and Shareware Decision Tree Toolsp. 179
5.5.2 Rule Generator Toolsp. 179
5.5.3 Free Rule Generator Toolsp. 182
5.6 The Streaming Analytical Forensic Processesp. 184
5.7 Forensic Analysis of Streaming Behaviorsp. 190
5.8 Forensic Real-Time Modelingp. 191
5.9 Deductive Forensics for Precrimep. 192
Chapter 6 Fraud Detection: On the Web, Wireless, and in Real Timep. 195
6.1 Definition and Techniques: Where, Who, and Howp. 195
6.2 The Interviews: The Owners, Victims, and Suspectsp. 202
6.3 The Scene of the Crime: Search for Digital Evidencep. 205
6.3.1 Four Key Steps in Dealing with Digital Evidencep. 206
6.4 Searches for Associations: Discovering Links and Text Conceptsp. 207
6.5 Rules of Fraud: Conditions and Cluesp. 208
6.6 A Forensic Investigation Methodologyp. 209
6.6.1 Step One: Understand the Investigation Objectivep. 209
6.6.2 Step Two: Understand the Datap. 210
6.6.3 Step Three: Data Preparation Strategyp. 210
6.6.4 Step Four: Forensic Modelingp. 210
6.6.5 Step Five: Investigation Evaluationp. 211
6.6.6 Step Six: Detection Deploymentp. 211
6.7 Forensic Ensemble Techniquesp. 212
6.7.1 Stage One: Random Samplingp. 212
6.7.2 Stage Two: Balance the Datap. 213
6.7.3 Stage Three: Split the Datap. 213
6.7.4 Stage Four: Rotate the Datap. 213
6.7.5 Stage Five: Evaluate Multiple Modelsp. 213
6.7.6 Stage Six: Create an Ensemble Modelp. 214
6.7.7 Stage Seven: Measure False Positives and Negativesp. 215
6.7.8 Stage Eight: Deploy and Monitorp. 215
6.7.9 Stage Nine: Anomaly Detectionp. 216
6.8 Fraud Detection Forensic Solutionsp. 216
6.9 Assembling an Evolving Fraud Detection Frameworkp. 227
Chapter 7 Cybersecurity Investigations: Self-Organizing and Evolving Analysesp. 233
7.1 What Is Cybersecurity Forensics?p. 233
7.2 Cybersecurity and Riskp. 234
7.3 Machine Learning Forensics for Cybersecurityp. 236
7.4 Deep Packet Inspection (DPI)p. 239
7.4.1 Layer 7: Applicationp. 239
7.4.2 Layer 6: Presentationp. 240
7.4.3 Layer 5: Sessionp. 240
7.4.4 Layer 4: Transportp. 240
7.4.5 Layer 3: Networkp. 241
7.4.6 Layer 2: Data Linkp. 241
7.4.7 Layer 1: Physicalp. 241
7.4.8 Software Tools Using DPIp. 241
7.5 Network Security Toolsp. 242
7.6 Combating Phisbingp. 245
7.7 Hostile Codep. 247
7.8 The Foreign Threatp. 250
7.8.1 The CNCI Initiative Detailsp. 252
7.9 Forensic Investigator Toolkitp. 256
7.10 Wireless Hacksp. 259
7.11 Incident Response Check-Off Checklistsp. 263
7.12 Digital Fingerprintingp. 267
Chapter 8 Corporate Counterintelligence: Litigation and Competitive Investigationsp. 271
8.1 Corporate Counterintelligencep. 271
8.2 Ratio, Trending, and Anomaly Analysesp. 274
8.3 E-Mail Investigationsp. 276
8.4 Legal Risk Assessment Auditp. 283
8.4.2 Inventory of External Inputs to the Processp. 285
8.4.3 Identify Assets and Threatsp. 286
8.4.4 List Risk Tolerance for Major Eventsp. 286
8.4.5 List and Evaluate Existing Protection Mechanismsp. 287
8.4.6 List and Assess Underprotected Assets and Unaddressed Threatsp. 287
8.5 Competitive Intelligence Investigationsp. 292
8.5 Triangulation Investigationsp. 302
Indexp. 307