Identifying and Analyzing Patterns of Evasion HM0210-13-1-0005 Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff.

Slides:



Advertisements
Similar presentations
Grant review at NIH for statistical methodology Jeremy M G Taylor Michelle Dunn Marie Davidian.
Advertisements

Priority Research Direction (I/O Models, Abstractions and Software) Key challenges What will you do to address the challenges? – Develop newer I/O models.
Chapter 14 Schedule Risk Management Dr. Ayham Jaaron Second Semester 2010/2011.
Predictive Data Modeling A CASE STUDY FOR DATA MODELING.
Spatiotemporal Pattern Mining For Travel Behavior Prediction UIC IGERT Seminar 02/14/2007 Chad Williams.
Machine Learning and Data Mining Course Summary. 2 Outline  Data Mining and Society  Discrimination, Privacy, and Security  Hype Curve  Future Directions.
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Intelligent Patrolling Sarit Kraus Department of Computer Science Bar-Ilan University Collaborators: Noa Agmon, Gal Kaminka, Efrat Sless 1.
Critical Analysis Presentation: T-Drive: Driving Directions based on Taxi Trajectories Authors of Paper: Jing Yuan, Yu Zheng, Chengyang Zhang, Weilei Xie,
Fifth Workshop on Link Analysis, Counterterrorism, and Security. or Antonio Badia David Skillicorn.
Oklahoma Supercomputing Symposium 2008 Oct 7 th 2008 Mining for Science and Engineering Presented by: Kenji Yoshigoe.
Context-based Information Sharing and Authorization in Mobile Ad Hoc Networks Incorporating QoS Constraints Sanjay Madria, Missouri University of Science.
The Decision-Making Process IT Brainpower
Multi-modal input interface GPS unit with antenna Multi-modal User-Device Interaction The data collection practice is enhanced from two perspectives: Text-to-speech.
Process Query Systems ENGS 112 Lecture 7. Process Query Systems (PQS) vs Data Base Systems (DBS) Data Base System Process Query System Data Sources Data.
Amirkabir University of Technology, Computer Engineering Faculty, Intelligent Systems Laboratory,Requirements Engineering Course, Dr. Abdollahzadeh 1 Dealing.
Dealing with NFRs Vahid Jalali Amirkabir university of technology, Department of computer engineering and information technology, Intelligent systems laboratory,
Data Mining – Intro.
Advanced Database Applications Database Indexing and Data Mining CS591-G1 -- Fall 2001 George Kollios Boston University.
Business Intelligence
Intelligence Analysis Tools PRS 3 Michele A. Melton Upstate New York Regional Intelligence Center Minneapolis, Minnesota March 29, 2007.
Yinhai Wang University of Washington and Harbin Institute of Technology For OpenITS Symposium Oct.
Module 3: Business Information Systems
Problem Statement and Motivation Key Achievements and Future Goals Technical Approach Kouros Mohammadian, PhD and Yongping Zhang (PhD Candidate), CME,
© 2010 IBM Corporation © 2011 IBM Corporation September 6, 2012 NCDHHS FAMS Overview for Behavioral Health Managed Care Organizations.
Understanding Data Analytics and Data Mining Introduction.
Unit 2: Engineering Design Process
Last Words COSC Big Data (frameworks and environments to analyze big datasets) has become a hot topic; it is a mixture of data analysis, data mining,
MAJOR BUSINESS INITIATIVES Gaining Competitive Advantage with IT
Highline Class, BI 348 Basic Business Analytics using Excel, Chapter 01 Intro to Business Analytics BI 348, Chapter 01.
Data Mining as Pre-EDD Investigatory Tool Team 9.
1 Controversial Issues  Data mining (or simple analysis) on people may come with a profile that would raise controversial issues of  Discrimination 
Mapping and analysis for public safety: An Overview.
Wang-Chien Lee i Pervasive Data Access ( i PDA) Group Pennsylvania State University Mining Social Network Big Data Intelligent.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The E ngineering Design Process Foundations of Technology The E ngineering Design Process © 2013 International Technology and Engineering Educators Association,
The E ngineering Design Process Advanced Design Applications The E ngineering Design Process Teacher Resource – The First Five Days: Day 2 © 2014 International.
Computational Tools for Population Biology Tanya Berger-Wolf, Computer Science, UIC; Daniel Rubenstein, Ecology and Evolutionary Biology, Princeton; Jared.
1 Knowledge Discovery from Transportation Network Data Paper Review Jiang, W., Vaidya, J., Balaporia, Z., Clifton, C., and Banich, B. Knowledge Discovery.
ANALYSIS TOOL TO PROCESS PASSIVELY- COLLECTED GPS DATA FOR COMMERCIAL VEHICLE DEMAND MODELLING APPLICATIONS Bryce Sharman & Matthew Roorda University of.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Ephemeral Network Broker to Facilitate Future Mobility Business Models/Transactions A collaboration between Ford University Research Program and University.
Integrated Corridor Management Initiative ITS JPO Lead: Mike Freitas Technical Lead: John Harding, Office of Transportation Management.
Spatial Computing Shashi Shekhar McKnight Distinguished University Professor Dept. of Computer Sc. and Eng. University of Minnesota
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Session-2 Participants Cyrus Shahabi Raju Vatsavai Mohamed Mokbel Shashi Shekhar Mubarak Shah Jans Aasman Monika Sester Wei Ding Phil Hwang Anthony Stefanidis.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
DECISION TREES Asher Moody, CS 157B. Overview  Definition  Motivation  Algorithms  ID3  Example  Entropy  Information Gain  Applications  Conclusion.
Knowledge Discovery and Data Mining 19 th Meeting Course Name: Business Intelligence Year: 2009.
Database Laboratory TaeHoon Kim. /18 Work Progress.
1 APPROVED FOR PUBLIC RELEASE U.S. Army Research, Development and Engineering Command ARL-CISD Social Network Analysis Team Leader Visual Analytics Consortium,
Lesson 3 Scientific Inquiry.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Big Data Analysis. Data Mining versus Data Analytics DATA ANALYSIS HYPOTHESIS CONCLUSION.
Resource Optimization for Publisher/Subscriber-based Avionics Systems Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee.
A Generic Approach to Big Data Alarms Prioritization
Data Mining – Intro.
Business Intelligence
Matt Hornbrook James Beams
1st November, 2016 Transport Modelling – Developing a better understanding of Short Lived Events Marcel Pooke – Operational Modelling & Visualisation Manager.
(Geo) Informatics across Disciplines!
Data Warehousing and Data Mining
University PI: Shashi Shekhar
Overall Classification of this Briefing is UNCLASSIFIED
Statistical Data Analysis
Advanced Design Applications The Engineering Design Process
Command Indoctrination Operations Security DD MMM YY
Presentation transcript:

Identifying and Analyzing Patterns of Evasion HM Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff Date: September 2013

Identifying and Analyzing Patterns of Evasion University of Minnesota PI: Shashi Shekhar Year of Grant: 2013 Technical Challenge Develop space-time aware methods to model evasive behavior by insurgents and other security targets. The behavior of security targets can be exploited to identify and provide intelligence about locations and schedules of target. Research Approach: We propose a method to distinguish between evasive and non-evasive behaving targets by quantifying the space-time entropy (predictability) of individuals’ movement. Also we propose a complementary algorithm which identifies “blackholes,” areas where no target movement is observed, despite predictions that such movement would occur. A list of targets found to have patterns of evasion are generated. Analyzing these evasion patterns will expose potential sighting and interception places and time-slots of targets on the list. Accomplishments/Results Develop a conceptual model to represent the spatio-temporal predictability of targets’ movement across a space. Create a conceptual model defining classes of blackhole events which will help estimate the expected continuity of observation through denied areas. Develop a conceptual model for hypothesized movement generation based on trajectory fragments. Develop a conceptual model for Denial and Deception Aware Return Periods. Potential Research Payoff Describe what impact successful research will deliver. Example: Creation of models for identifying evasive patterns. Success of predicting target movements and schedules. Building of tools embodying the new results. Collaborations and Teaming Mark Abrams, a consultant for the National Reconnaissance Office with experience in GPS deprived areas. Prof. May Yuan at the University of Oklahoma working on movement pattern analysis BI Incorporated, he makers of ankle-bracket GPS tracking devices for felons out on parole, to utilize the anonymized GPS-track datasets of offenders for research purposes. Future Efforts Explore the tools and test bed to handle new blackhole patterns, more advanced movement hypothesis and temporally correlated return periods. Contact Info PI: Shashi ShekharTM: James M. Kang Transition Opportunities Extend capabilities of Oracle Spatial to facilitate a complete workflow dataset from dataset input to actionable information.

Identifying and Analyzing Patterns of Evasion Identify the behavior of Insurgents and Security Targets by using location data. By identifying these behaviors, actionable intelligence about locations and schedules of target individuals can be provided.

Objectives Develop space-time aware methods for modeling patterns of evasive behavior by insurgents and security targets: Distinguish between evasive and non-evasive behaving targets by quantifying space-time entropy of individual’s movement. Identify Blackhole Regions where no target movement is observed despite predictions. Generate hypothesis about target location and travel routes by using trajectory fragments. Model Denial and Deception Aware Return Periods to estimate a target’s schedule to aid in interception and surveillance.

Anticipated Results Mathematical Models Develop a graph based spatio-temporal data model to represent return periods. Computer Algorithms Design new scalable data mining algorithms to find; Space-Time Entropy Blackholes Theory-Based Movement Predictions Return Periods Data Analysis Methods Develop new interest measures to quantify the proposed patterns of life. Analytical Tools Develop new software and extend capabilities of existing software to facilitate the workflow from dataset to actionable information.

Applicability “Predictability kills” In Operation Areas, soldiers are advised to avoid geo-tagging, which can reveal their location to adversaries. This advice is kept in mind by the terrorists as well. In operation areas like Afghanistan, non-evasive tribal groups operate (e.g., villagers, nomads, traders) with different patterns-of- life, or different movement patterns, than evasive terrorists.

Approach Two Phases: Identify Evasion Patterns Distinguish between evasive and non-evasive behaving targets by quantifying the space-time entropy Identify blackholes, where no target movement observed despite predictions Analyze Evasion Patterns Movement hypothesis for predicting movement in denied areas Model return periods to quantify and identify anomalous visits in target movement data. By identifying these evasive behaviors, actionable intelligence about locations and schedules of target individuals can be provided.

Science 1-4 Space-Time Entropy Discrimination Identify target groups based on historical movement patterns by using entropy measures. Shannon’s Diversity Index (SDI) Commonly used measure of entropy. Quantify predictability. SDI does not distinguish between clustered and unclustered distributions(SDI may return the same value even though the data is more concentrated). SDI is not independent of space partitioning (Depending on the partition size, SDI score may change even underlying data does not). Develop a conceptual model (which addresses the limitations of SDI) to represent the spatio-temporal predictability of target’s movement across space.

Science 2/4 Blackhole and Patterns of Evasion Detection Blackhole: Areas where no target movement is observed although target movements are predicted Identify significant mismatches between observations (expected vs. observed). Differentiate population and target evasion. Extrapolate Potential Path

Science 3/4 Theory Based Movement Hypothesis Generation Traditional Data Mining Algorithms can not be used inside blackholes due to lack of observations. Predict behavior inside blackhole. Use transportation networks Points of interest Hypothesize routes and locations based on the recorded observations. We know starting and ending points We know transportation networks We predict the most likely routes, main corridors and key locations that may be used.

Science 4/4 Return Period in Movement Datasets Model routine activities of people Easier data mining on movement datasets Easier highlighting of anomalous activities Develop a conceptual model for denial-and- deception aware return periods to quantify and identify anomalous places and visits. Challenges; Space and Time Partitioning Statistical Identification Measures for Anomalous Places and Visits An efficient algorithm to deal with spatial big data. Once in 30 days Routine Activities

Conclusion Identifying the behavior of terrorists can exploit their intentions. Insurgents and Security Targets use Denial, Deception and Evasion Techniques to mask their movement. These techniques may cause wrong operational and tactical decisions. By identifying these evasive behaviors actionable intelligence about locations and schedules of target individuals can be provided.