WSEAS Transactions on Information Science and Applications


Print ISSN: 1790-0832
E-ISSN: 2224-3402

Volume 15, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



Suspicious Call Detection Using Bayesian Network Approach

AUTHORS: Syed Muhammad Aqil Burney, Qamar Ul Arifeen, Nadeem Mahmood, Syed Abdul Khaliq Bari

Download as PDF

ABSTRACT: The rapid advancements in the fast and rapidly growing field of information and communication technologies (ICT’s) has lead us to new thinking paradigm and it is being implemented in all walks of life including business, finance, health, management, engineering, basic sciences, sports, social sciences and many other domains. There are many advantages of speedy growth of internet and mobile phones in the society and people are taking full advantage of them. However this technology is widely used by the criminals for the execution of criminal or terrorist activities. The state of Pakistan is going through a period where they are crushing criminal and terrorist networks throughout the country. There are number of terrorist and criminal activities in the last few years. This study focuses on the use of related equipment like mobile phone, SIM’s etc. in criminal or terrorist activities. We have analyzed call detail records (CDR) collected from tower data of five mobile companies by using geo-fencing approach. The classification of suspicious call detection and identification is done by using Bayesian classifier approach. In the research document, the researcher exhibits approaches for establishing Bayesian systems from previous information and review Bayesian techniques for improvisation of these models. We encapsulate approaches for structuring and learning parameters in Bayesian system, including various methods to learn from Bayesian database

KEYWORDS: Information and communication technology (ICT), Bayesian Network, call data record (CDR), criminal network, geo-fencing, suspicious call detection, geo-fence.

REFERENCES:

[1] Mohamed Ridza Wahiddin Abdul Waheed Mahesar, Ahmad Waqas, Nadeem Mehmood, Asadullah Shah, 2015, 'Analyzing the Weighted Dark Networks using Scale-Free Network Approach', WSEAS transactions on computers, Vol. 14, pp: 748-759.

[2] Qamar ul Arifeen, S M Aqil Burney, Nadeem Mahmood, Kashif Rizwan, Syed Abdul Khaliq Bari, “Economic Review and Street crime Analysis Using Cell Phone Snatching and Theft”, Current Economics and Management Research, ISSN 2356-8887, www.textroad.com. 5(5)266-275, 2015.

[3] Burde,R. and Khan,T., (2012) Traceability in Digital forensic Investigation. International Journal Advanced Research in Computer Science & Software Engineering vol 2, issue 10, Oct 2012. ISSN: 2277128X

[4] Qamar ul Arifeen, Soft computing approaches in forensics: an intelligent system approach, a Ph. D. thesis submitted to the University of Karachi, Pakistan, 2014.

[5] Ashley Brinson, Abigail Robinson, and Marcus Rogers (2006), A Cyber forensics ontology: creating a new approach to studying cyber forensics, Digital Investigation, Elsevier pp 37-43.

[6] Baggili, I. (2011). Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers. Springer Science & Business Media.

[7] Goel, S. (2010). Digital Forensics and Cyber Crime: First International ICST Conference, ICDF2C 2009, Albany, Ny, USA, September 30 - October 2, 2009, Revised Selected Papers. Springer Science & Business Media.

[8] Jones, A. (2008) Keynote speech. In: First International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Adelaide, Australia, January 21– 23, 2008.

[9] Khan, Z. (2014). A New War Zone for Pakistan’s Islamists. Pakistan's Counterterrorism Challenge, 169.

[10] Pakistan Telecommunication Authority, Online: http://www.pta.gov.pk/. Accessed September, 2014

[11] Ahmed M. N, Muhammad Elmogy and A. M. Raid (2013) Fuzzy crimes investigation framework for tracking data. International Journal of Computer Applications, vol. 84-1, pp 34-43.

[12] Alin C popesu and HanyFarid (2013), Statistical tools for digital forensic, Department of Computer Science at Dartmouth College, Hanvor, USA.

[13] MacDonald, A. D., Sather, M. W. and Snapp, J. W. (2014), 'Methods and apparatus for mobile station location estimation.' U.S. Patent No. 8,676,231.

[14] Wang, S., Min, J., and Yi, B. K. (2008). 'Location based services for mobiles: Technologies and standards.' IEEE international conference on communication (ICC), 2008.

[15] Dmitry, N. and Sneps-Sneppe, M.,Geofence and network proximity.Internet of Things, Smart Spaces, and Next Generation Networking. Springer Berlin Heidelberg, 2013. pp. 117-127.

[16] Humphries, Laymon Scott, and Huey-Jiun Ngo (2007). 'Method and system for tracked device location and route adherence via geofencing.' U.S. Patent No. 7,164,986.

[17] Baumgartner, K., S. Ferrari, and G. Palermo (2008). 'Constructing Bayesian networks for criminal profiling from limited data.' Knowledge-Based Systems 21.7: pp 563-572.

[18] Oatley, Giles C., and Brian W. Ewart. (2003) 'Crimes analysis software:‘pins in maps’, clustering and Bayes net prediction.' Expert Systems with Applications 25.4: 569-588.

[19] Eagle, N., Quinn, J. A., and Clauset, A. (2010). Methodologies for continuous cellular Tower Data Analysis.

[20] Martin, G. (2013). Terrorism and Transnational Organized Crime. Transnational Organized Crime: An Overview from Six Continents, 163.

[21] Gelman, Andrew, et al. Bayesian data analysis. Vol. 2. Chapman & Hall/CRC, 2014.

[22] Citizens-Police Liaison Committee (CPLC). Online: http://www.cplc.org.pk/. Accessed July, 2014.

[23] Burney, A., Mahmood, N., and Abbas, Z. 2012. Advances in Fuzzy Rough Temporal Databases. In Proc 11th WSEAS International Conference on AIKED, University of Cambridge UK, pp 237-242.

[24] Burney, A., Mahmood, N., and Ahsan, K. 2010. TempR-PDM: A Conceptual Temporal Relational Model for Managing, Patient Data. In Proc. Int. WSEAS conference AIKED, University of Cambridge UK, pp. 237-243.

[25] Friedman, N., Geiger, D., and Goldszmidt, M. (1997). Bayesian network classifiers. Machine learning, Vol. 29, No. 2-3, pp. 131-163.

[26] Gonzalez, M.C. Hidalgo, C.A. Barabasi, A.L. (2008) understanding individual human mobility patterns. A Reality mining: sensing complex social system. Personal and Ubiquitous computing 10, 255-268.

[27] Imam, K. (2011). Police and the Rule of Law in Pakistan: A Historical Analysis, Berkeley Journal of Social Sciences, Vol. 1, No. 8.

[28] Burney, A., Mahmood, N., & Abbas, Z. (2012a). Advances in Fuzzy Rough Temporal Databases, In Proceeding: 11th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Base at University of Cambridge, UK, Feb. 22-24, 2012.

WSEAS Transactions on Information Science and Applications, ISSN / E-ISSN: 1790-0832 / 2224-3402, Volume 15, 2018, Art. #5, pp. 37-49


Copyright © 2017 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site