logo

Analyzing Cyber Threats and Security Technologies

   

Added on  2020-03-16

7 Pages1379 Words195 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY TECHNOLOGIESInformation Security TechnologiesName of the StudentName of the UniversityAuthor’s note
Analyzing Cyber Threats and Security Technologies_1

1INFORMATION SECURITY TECHNOLOGIESTable of ContentsPaper 7.................................................................................................................................2Problem............................................................................................................................2Methodology Adopted.....................................................................................................2Techniques Used in the Solution.....................................................................................2Paper 11...............................................................................................................................3Problem............................................................................................................................3Methodology Adopted.....................................................................................................4Techniques used in the Solution......................................................................................4References............................................................................................................................6
Analyzing Cyber Threats and Security Technologies_2

2INFORMATION SECURITY TECHNOLOGIES Paper 7Problem According to Scanlon and Gerber (2014), Internet has facilitated the terroristcommunities and groups to recruit violent extremists and expand their scale of activities and sizeof their groups. The potential of the online communities is more as they can use and exchangevarious online resources for the purpose of carrying out illegal activity. Methodology AdoptedThis article said that in order to classify forum posts certain criteria needs to be fulfilled.The data must be collected from popular VE groups, the data should be within a time span likeone decade and the data must be in English language or some language that can be translated inEnglish. This article identified Dark Web Portal to be a storage space of messages from 28online forums that focus on Islamic discussions and extremist religious (Ríos and Munoz 2012).The forum posts from Ansar1 have been collected and pre processed by manually annotating thecollected information as ‘a’ if it is related to VE recruitment and as ‘b’ if it a non VE recruitmentpost. This article focused on an analytical approach to find out whether forum post is meant forVE recruitment or not. A probability model has been used. Techniques Used in the SolutionClassification functions like naïve bayes, classification trees, boosting, logistic regressionand support vector machines (SVM) were used for the purpose of classifying forum posts. Theannotated information was utilized by randomly segmenting the data. The data was broken intoten folds (Scanlon and Gerber 2014). Cross validation have been applied. The classificationmethods have been evaluated by ROC curves. The ROC curves are known for showing trade-
Analyzing Cyber Threats and Security Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.