IDEAS home Printed from https://ideas.repec.org/a/bla/jamist/v61y2010i2p405-418.html
   My bibliography  Save this article

Detection of access to terror‐related Web sites using an Advanced Terror Detection System (ATDS)

Author

Listed:
  • Yuval Elovici
  • Bracha Shapira
  • Mark Last
  • Omer Zaafrany
  • Menahem Friedman
  • Moti Schneider
  • Abraham Kandel

Abstract

Terrorist groups use the Web as their infrastructure for various purposes. One example is the forming of new local cells that may later become active and perform acts of terror. The Advanced Terrorist Detection System (ATDS), is aimed at tracking down online access to abnormal content, which may include terrorist‐generated sites, by analyzing the content of information accessed by the Web users. ATDS operates in two modes: the training mode and the detection mode. In the training mode, ATDS determines the typical interests of a prespecified group of users by processing the Web pages accessed by these users over time. In the detection mode, ATDS performs real‐time monitoring of the Web traffic generated by the monitored group, analyzes the content of the accessed Web pages, and issues an alarm if the accessed information is not within the typical interests of that group and similar to the terrorist interests. An experimental version of ATDS was implemented and evaluated in a local network environment. The results suggest that when optimally tuned the system can reach high detection rates of up to 100% in case of continuous access to a series of terrorist Web pages.

Suggested Citation

  • Yuval Elovici & Bracha Shapira & Mark Last & Omer Zaafrany & Menahem Friedman & Moti Schneider & Abraham Kandel, 2010. "Detection of access to terror‐related Web sites using an Advanced Terror Detection System (ATDS)," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 61(2), pages 405-418, February.
  • Handle: RePEc:bla:jamist:v:61:y:2010:i:2:p:405-418
    DOI: 10.1002/asi.21249
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/asi.21249
    Download Restriction: no

    File URL: https://libkey.io/10.1002/asi.21249?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jamist:v:61:y:2010:i:2:p:405-418. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.asis.org .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.