Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.2.397

Illegal and Harmful Information Detection Technique Using Combination of Search Words  

Han, Byeong Woo (Korea University)
Yoon, Ji Won (Korea University)
Abstract
Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.
Keywords
OSINT; Inteligence; illegal drug; Google; Security; Criminal detection; Automatic detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Anonymous Declares War On ISIS Following Paris Massacre, The Huffington Post UK, Nov.16.2015 http://goo.gl/BN4uKs
2 Tekir, S. Open Source Intelligence Analysis: A Methodological Approach. Saarbrucken, Germany: VDM, 2009.
3 Yoon, Hae Sung, Yun, Min Woo, "Cyberterrorism : Trends and Reponses" Korean Institute of Criminology Research Series (2012): 4-334, 2012
4 Gerstein, Josh, "NSA: PRISM Stopped NYSE Attack", Politico. Retrieved June 18, 2013.
5 Meet Prism's little brother: Socmint, wired, Jun.26.2013 http://www.wired.co.uk/news/archive/2013-06/26/socmint
6 Four hours a day every day, people who watch the porn, JoongAng Daily, Nov.08.2015 http://www.koreadaily.com/news/read.asp?art_id=3803400
7 Clive Best, "Web Mining for Open Source Intelligence," Information Visualisation, 2008. IV'08. 12th , 2015
8 Best, C. "Challenges in Open Source Intelligence," Intelligence and Security Informatics Conference (EISIC), 2011 European pp. 58-62, 2011
9 Neri, F., Pettoni, M., "Stalker, A Multilingual Text Mining Search Engine for Open Source Intelligence," Information Visualisation, 2008. IV '08. 12th International Conference pp. 314-320, 2008
10 Christopher J.Rhodes, "The Use of Open Source Intelligence in the Construction of Covert Social Networks," Counterterrorism and Open Source Intelligence, 2011
11 Watters, Paul A., and Nigel Phair. "Detecting illicit drugs on social media using automated social media intelligence analysis (ASMIA)." Cyberspace Safety and Security. Springer Berlin Heidelberg, pp. 66-76, 2012
12 jsoup: http://jsoup.org/
13 Kkokkoma lexical analyzer : http://kkma.snu.ac.kr/
14 Lee, Sungjick, and Han-joon Kim. "News keyword extraction for topic tracking," Networked Computing and Advanced Information Management, 2008. NCM'08. Fourth International Conference on. Vol. 2. IEEE, 2008.
15 SeleniumIDE: http://seleniumhq.org/projects/ide/