Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96.

Slides:



Advertisements
Similar presentations
Knowledge Representation
Advertisements

SOCI 5013: Advanced Social Research: Network Analysis Spring 2004.
Multisource Fusion for Opportunistic Detection and Probabilistic Assessment of Homeland Terrorist Threats Kathryn Blackmond Laskey & Tod S. Levitt presented.
Social Media Mining Chapter 5 1 Chapter 5, Community Detection and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010.
Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial.
Machine Learning and Data Mining Course Summary. 2 Outline  Data Mining and Society  Discrimination, Privacy, and Security  Hype Curve  Future Directions.
C SC 421: Artificial Intelligence …or Computational Intelligence Alex Thomo
An Agent Based Approach to Situational Awareness Anupam Joshi UMBC/IBM Research-India Joint Work with several colleagues.
Xyleme A Dynamic Warehouse for XML Data of the Web.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
AI - Week 24 Uncertain Reasoning (quick mention) then REVISION Lee McCluskey, room 2/07
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Building Knowledge-Driven DSS and Mining Data
The Very Small World of the Well-connected. (19 june 2008 ) Lada Adamic School of Information University of Michigan Ann Arbor, MI
Social Network Analysis for National Security Michael Last Department of Defense.
LLNL-PRES This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
1 Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction Zequian shen, Kwan-Liu Ma, Tina Eliassi-Rad Department.
Technology Applicability for Prediction & Recognition of Piracy Efforts NATO ASI September 2011 Salamanca, Spain.
Social Networks Corina Ciubuc.
Topic 13 Network Models Credits: C. Faloutsos and J. Leskovec Tutorial
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1. 2 Learning Objectives To understand: the elements or stages of the strategic management process the different perspectives on strategy development.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Making Information Systems Intelligent Making Information Systems Intelligent Dr. Geoffrey P Malafsky TECHi2.
IIT Indore © Neminah Hubballi
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
SLB /04/07 Thinking and Communicating “The Spiritual Life is Thinking!” (R.B. Thieme, Jr.)
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
DECISION SUPPORT SYSTEM ARCHITECTURE: The data management component.
Iterative Readability Computation for Domain-Specific Resources By Jin Zhao and Min-Yen Kan 11/06/2010.
Alias Detection Using Social Network Analysis Ralf Holzer, Bradley Malin, Latanya Sweeney LinkKDD 2005 Advisor: Dr. Koh Jia-Ling Reporter: Che-Wei,
Principles of Social Network Analysis. Definition of Social Networks “A social network is a set of actors that may have relationships with one another”
1 Controversial Issues  Data mining (or simple analysis) on people may come with a profile that would raise controversial issues of  Discrimination 
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Economic Development for the DFW Metroplex Related to Security: An Academic Perspective Dr. Bhavani Thuraisingham The University of Texas at Dallas December.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Advanced Methods and Analysis for the Learning and Social Sciences PSY505 Spring term, 2012 April 25, 2012.
Chapter 11 Artificial Intelligence Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Special Topics in Educational Data Mining HUDK5199 Spring 2013 March 25, 2012.
Chapter 5 Social Network Analysis: Techniques to Discover How Work Really Gets Done.
Ontology-Based Computing Kenneth Baclawski Northeastern University and Jarg.
Data Visualization Michel Bruley Teradata Aster EMEA Marketing Director April 2013 Michel Bruley Teradata Aster EMEA Marketing Director.
Complex Network Theory – An Introduction Niloy Ganguly.
PHS / Department of General Practice Royal College of Surgeons in Ireland Coláiste Ríoga na Máinleá in Éirinn Knowledge representation in TRANSFoRm AMIA.
Complex Network Theory – An Introduction Niloy Ganguly.
Network Community Behavior to Infer Human Activities.
Anomaly Detection and Internal Network Security Jose Nazario, Ph.D. Arbor Networks.
Detecting terrorist activities Presentation on a specialist topic in Data Mining and Text Analytic.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
How to Analyse Social Network? Social networks can be represented by complex networks.
Science Process Skills. What is Science?
Understanding Naturally Conveyed Explanations of Device Behavior Michael Oltmans and Randall Davis MIT Artificial Intelligence Lab.
1 Discovering Web Communities in the Blogspace Ying Zhou, Joseph Davis (HICSS 2007)
By Matt Bogard, M.S. Coordinator, Market Research Instructor, Department of Economics Western Kentucky University.
Business Analytics Several odds and ends Copyright © 2016 Curt Hill.
CRIM6660 Terrorist Networks Lesson 1: Introduction, Terms and Definitions.
Real-time criminal event detection system for live social data streams Jennifer Woodard sisu labs - semantic technology company.
Introduction to Machine Learning, its potential usage in network area,
Machine Learning for Computer Security
MA4404 Winter 2018 Introduction to Machine Learning
SOCIAL NETWORKS Amit Sharma INF -38FQ School of Information
Research Scopes in Complex Network
TA : Mubarakah Otbi, Duaa al Ofi , Huda al Hakami
Introduction to Visual Analytics
Mining Social Networks. Contents  What are Social Networks  Why Analyse Them?  Analysis Techniques.
SOCIAL NETWORKS Amit Sharma INF -38FQ School of Information
Jana Diesner, PhD Associate Professor, UIUC
Presentation transcript:

Self-Learning Ontologies Presented to the 25 th Soar Workshop Ann Arbor, MI June 15-17, 2005 Tim Darr, Ph. D. University of Michigan AI Lab ‘96

Introduction – 21 st Century Technologies R&D company in Austin, TX –40 employees and growing –50% of employees hold MS or PhD in Math, CS, or EE –First major contract award in 1998 Much of our work has been done under contract for –US Army –USAF –ONR –Intelligence Community –Defense Advanced Research Projects Agency (DARPA) –Department of Homeland Security (DHS) Founders –Sherry Marcus, Ph.D., MIT –Darrin Taylor, Sc.D., MIT

Introduction –21 st Century Technologies Core Competencies –Link Analysis –Graph-based pattern recognition –Social network analysis (SNA) –Statistical Pattern Recognition –Data mining –Predictive planning –Natural Language Processing and Text Extraction –Fielded Applications for: Defense Intelligence Homeland security

Definition of Link Analysis Link Analysis is about Making Connections that represent Meaningful Links between Data Elements to detect Complex Relational Structures indicative of Patterns of Interest. DSB Study on Transnational Threats: making of connections between otherwise meaningless bits of information is at the core of (transnational) threat analysis.” Patterns: Cargo being shipped From country that does not produce said cargo Pattern of Shipment Changes Commodity has a new “notify party” For just one shipment. Learned Pattern #3 Connecting the Dots is Easy; Deciding Which Dots to Connect Is Hard Pattern #1 Inferred Pattern #2

Graph-Based Pattern Recognition Given: –A pattern graph that defines a threat –An evidence graph that records observed activity Graph matching lets you –Correlate events to quickly isolate true threats from normal activity –Develop higher-level situational awareness Graph Pattern Graph Match Nodes represent things People, organizations, objects, events, alerts, packets, etc. Edges represent relationships Communication, friend, participant, owner, etc.

Social Network Analysis (SNA) Originally formulated for human social interaction Metric values for normal and abnormal behavior are usually different –We can use metric values to classify observed activity Average path length “Ring-like-ness” Centrality / betweenness of nodes Clique-ish-ness Many reasons for “abnormal” social behavior –Dysfunctional organization –Covert organization Legitimate Terrorist Criminal –Unexpected organization Terrorist activity within normal human social activity Coordinated attacks within normal network activity

Dormant vs. Active Networks Observable Social Metrics: –Group size: 15  19 –Link Count: 20  49 –Density: 19%  29% –Path Length: 2.6  1.9 –Closed Trios: 41%  60% –Appearance of Hubs  Approach: Calculate Salient Social Metrics from data. Use Social Network Analysis (SNA) to identify threat signatures. This method would have been successful in detecting active 911 network. Dormant 911 Network (around 2 suspects) Active 911 Network (around 2 suspects)

Ontologies in Graph Matching Traditional Ontologies –D efine type-subtype relationships with multiple inheritance –Patterns refer to general event types instead of specific events Terrorist Ontology Generic threat pattern Observed data “Bribery” isa “FinancialFraud”, so will match. –Ontologies provide linkage between observed data and patterns of interest

What is a “Self-Learning” Ontology? Advanced ontologies to provide more powerful ontological capabilities Ontologies based on cognitive systems –Domain-specific ontologies Terrorists, terror groups, methods of financing –Ontologies as domain experts –Learn new patterns of behavior Social network analysis Declarative representations –Encode knowledge in a declarative form –Infer categorization of entities –Easily respond to new facts Streaming data ingest Ontology fusion –Fuse multiple representations –Inference over fused representations –Take advantage of strengths of different ontological representations and inference mechanisms

Evaluation Golden Nuggets –None Coal –No working system - YET For further evaluation or questions contact: – Dr. Tim Darr –Dr. Seth Greenblatt