How To Understand The Benefits Of Big Data Analysis



Similar documents
Social network analysis: A tool for better understanding and managing your cluster

Data Mining and Analytics in Realizeit

locuz.com Big Data Services

Visualizing Threats: Improved Cyber Security Through Network Visualization

IntelCenter Database (ICD) for Colleges & Universities 30 Jan info@intelcenter.com

Mapping Networks of Terrorist Cells

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

LISTENING, INTERPRETING, AND ASKING BIG DATA MARKETING QUESTIONS

XpoLog Center Suite Log Management & Analysis platform

How To Use Social Media To Improve Your Business

MINFS544: Business Network Data Analytics and Applications

IBM Social Media Analytics

WHITE PAPER: Ten Tips for More Effective Physician Marketing. Bill Reinstein President & CEO of MedData Group MedData Group, LLC

Combating Fraud, Waste, and Abuse in Healthcare

Investigative Data Mining and its Application in Counterterrorism Nasrullah Memon 1, Abdul Rasool Qureshi 2,

White Paper. How Streaming Data Analytics Enables Real-Time Decisions

ETCIC Internships Open to Sophomores:

ENTERPRISE APPLICATIONS

NG 911-FirstNet Whitepaper. NPSBN as a Strategic Enabler of Next Generation 9-1-1

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach

CoolaData Predictive Analytics

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Intelligence-Driven Security

Data Mining Solutions for the Business Environment

USING BIG DATA FOR INTELLIGENT BUSINESSES

How To Make Data Streaming A Real Time Intelligence

Examining graduate committee faculty compositions- A social network analysis example. Kathryn Shirley and Kelly D. Bradley. University of Kentucky

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE

Predicting & Preventing Banking Customer Churn by Unlocking Big Data

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION

Conceptual Integrated CRM GIS Framework

Predicting & Preventing Banking Customer Churn by Unlocking Big Data

OPERA SOLUTIONS CAPABILITIES. ACH and Wire Fraud: advanced anomaly detection to find and stop costly attacks

How To Solve A Violent Home Invasion With A United Force

IBM Social Media Analytics

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Healthcare Measurement Analysis Using Data mining Techniques

PREDICTIVE ANALYTICS IN FRAUD

Beyond listening Driving better decisions with business intelligence from social sources

The Cloud for Insights

Optimizing Network Vulnerability

Application Performance Monitoring (APM) Technical Whitepaper

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Oracle Big Data Discovery The Visual Face of Hadoop

Publishing Stories to Lumira Cloud

SAP Solution Brief SAP HANA. Transform Your Future with Better Business Insight Using Predictive Analytics

Business Intelligence Systems

Bigger Data for Marketing and Customer Intelligence Customer Analytics Roadmap

A real situation of OpenStack based cloud computing

ORACLE SOCIAL ENGAGEMENT AND MONITORING CLOUD SERVICE

SCALABLE ENTERPRISE BUSINESS INTELLIGENCE

Guide: Social Media Metrics in Government

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

InfiniteGraph: The Distributed Graph Database

IBM Content Analytics: Rapid insight for crime investigation

Click to edit Master title style

Big Data for Satellite Business Intelligence

Data Refinery with Big Data Aspects

Extreme Networks Security Analytics G2 Risk Manager

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

What is SNA? A sociogram showing ties

Big Data and Analytics in Government

Executive Diploma in Digital Marketing

WHITE PAPER. Social media analytics in the insurance industry

Attack Intelligence: Why It Matters

Navigating Big Data business analytics

TAUS Quality Dashboard. An Industry-Shared Platform for Quality Evaluation and Business Intelligence September, 2015

Advanced analytics at your hands

Adobe Insight, powered by Omniture

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

Full-text Search in Intermediate Data Storage of FCART

BlackStratus for Managed Service Providers

Location Analytics for Financial Services. An Esri White Paper October 2013

Apigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps

ClearSkies. Re-Defining SIEM

Developing the SMEs Innovative Capacity Using a Big Data Approach

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Social Media. Campaign Checklist

UX analytics to make a good app awesome

Transcription:

Ioana-Brînduşa Bogdan Masterand Faculty of Mathematics and Informatics Spiru Haret University Bucharest, Romania bicuioana@yahoo.com THE BENEFITS OF BIG DATA ANALYTICS

Abstract: The wealth of information that is only one click away, correlated with the development of social networks, changed the strategic vision of intelligence services. Analysis on big data has become a strategic ally in the fight to ensure national security and contribute, through software tools for analysis and visualization, both to identify risks and vulnerabilities and to establish their structure and patterns. The presentation focuses on how the intelligence services have found it appropriate to ensure their knowledge by analyzing big data, gaining an overview which provides prevention and combating the activities that bring threats to national security. Keywords: analysis, big data, social network, intelligence.

cheap memory fast Internet connections, and obsessively used sensor-laden smart-phones massive datasets

Let s see how much data we are generating every second, of every minute, of every hour, of every day, of every month, of every year.

views sentiments likes and dislikes much more

intelligence services capture the information analyze and interpret valuable information a single conversation not reveal much millions of conversations identify trends, issues, relationships target individuals with relevant

No precise definition of "big data" exists, but a good rule of thumb is data sets too large to fit in main memory on a single machine. Four distinct applications segments comprise the big data market.

Big Data analytics are the future of providing security. Intelligence services have to use analysis instruments to unlock the knowledge from these vast numbers of natural language to deliver previously un-heard of levels of big-data analysis. They are getting to know more about how you move around your neighborhood and your city, about your daily habits and schedule. where were you at 11:15 last night? may be consigned to history.

Social Network Analysis/ SNA is a mathematical method for connecting the dots. SNA allows us to map and measure complex, and sometimes covert, human groups and organizations.

How do we determine who is important in a Network?

Tracking Two Identified Terrorists Early in 2000, the CIA was informed of two terrorist suspects linked to al-qaeda. Nawaf Alhazmi and Khalid Almihdhar were photographed attending a meeting of known terrorists in Malaysia

Arrest or deport these suspects immediately? No, intelligence services need to discover more of the al-qaeda network. Once suspects have been discovered, we can use their daily activities to uncloak their network. who they call / email who visits with them locally and in other cities where their money comes from picture of the terrorist organization

The figure shows the two suspects and their immediate ties: direct ties are colored green link thickness show the strength of connection their indirect ties (the connections of their connections ) Atta is just another node to be investigated. The investigator uncloaking Mohammed Atta s network would not be aware of Atta's eventual importance.

the direct connections of the original suspects their indirect connections Social network metrics reveal Mohammed Atta emerging as the local leader

Resources: http://www.orgnet.com/prevent.html http://www.slideshare.net/kateto/network-analysis-basics-and-applications-to- online-networks?qid=892b01a1-19a9-459f-87e1-61a356f84f98&v=qf1&b=&from_search=12 On-Line UCINET: www.analytictech.com This is the company website. http://faculty.ucr.edu/~hanneman/nettext/ This is an on-line reference manual to UCINET. http://tech.groups.yahoo.com/group/ucinet An online community of practice for UCINET.