Suspect Tracking Based on Call Logs Analysis and Visualization

被引:0
|
作者
Longtong, Yosawee [1 ]
Narupiyakul, Lalita [1 ,2 ]
机构
[1] Mahidol Univ, Fac Engn, Dept Comp Engn, 25-25 Phutthamonthon 4 Rd, Phutthamonthon 73170, Nakhon Pathom, Thailand
[2] Mahidol Univ, Integrat Computat Biosci Ctr, 25-25 Phutthamonthon 4 Rd, Phutthamonthon 73170, Nakhon Pathom, Thailand
关键词
call log tracking; suspect's tracking; call logs visualization;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Thailand, investigator can track and find the suspects by using call logs from suspects' phone numbers and their contacts. In many cases, the suspects changed their phone numbers to avoid tracking. The problem is that the investigators have difficulty to track these suspects from their call logs. Our hypothesis is that each user has a unique calling behavior pattern. The calling pattern is importance for tracking suspect's telephone number. To compare the calling patterns, we consider common contact groups. Thus, the aim of this project is to develop a call logs tracking system which can predict a set of new possible suspect's phone numbers and present their contacts' connection with our network diagram visualization based on Graph database (Neo4j). This system will be very necessary for investigators because it can save investigators' time from analyzing excessive call logs data. The system can predict the possible suspect's phone numbers. Furthermore, our visualization can enhance human's sight ability to connect the relation among related phone numbers. Finally, the experimental results on real call logs demonstrate that our method can track telephone number approximately 69% of single possible suspect phone number's matching while 89% of multiple possible suspect phone numbers' matching.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Visualization Method Based on Graph Database in Security Logs Analysis
    Tang, Xinyu
    Ma, Chunguang
    Yu, Min
    Liu, Chao
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2017), 2017, : 82 - 89
  • [2] Visualization of sanitized email logs for spam analysis
    Muelder, Chris
    Ma, Kwan-Liu
    [J]. ASIA-PACIFIC SYMPOSIUM ON VISUALISATION 2007, PROCEEDINGS, 2007, : 9 - +
  • [3] A Suspect Vehicle Tracking System Based on Video
    Chen, Yadi
    Wang, Tuo
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON MULTIMEDIA TECHNOLOGY (ICMT-13), 2013, 84 : 200 - 207
  • [4] NetflowVis: A Temporal Visualization System for Netflow Logs Analysis
    He, Likun
    Tang, Binbin
    Zhu, Min
    Lu, Binbin
    Huang, Weidong
    [J]. COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, CDVE 2016, 2016, 9929 : 202 - 209
  • [5] User Profile Modelling Based on Mobile Phone Sensing and Call Logs
    Garcia-Davalos, Alexander
    Garcia-Duque, Jorge
    [J]. INFORMATION TECHNOLOGY AND SYSTEMS, ICITS 2020, 2020, 1137 : 243 - 254
  • [6] DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs
    Park, Sungha
    Lee, Sangjin
    [J]. Forensic Science International: Digital Investigation, 2022, 43
  • [7] DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs
    Park, Sungha
    Lee, Sangjin
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 43
  • [8] Mining Call Spammers from Logs
    Liu, Zhipeng
    Duan, Weihua
    [J]. 2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 142 - 145
  • [9] A Grammar-Based Approach for Applying Visualization Taxonomies to Interaction Logs
    Gathani, Sneha
    Monadjemi, Shayan
    Ottley, Alvitta
    Battle, Leilani
    [J]. COMPUTER GRAPHICS FORUM, 2022, 41 (03) : 489 - 500
  • [10] Patrol car and agent tracking suspect tagging and tracking
    Wilkins, SC
    [J]. SECURITY SYSTEMS AND NONLETHAL TECHNOLOGIES FOR LAW ENFORCEMENT, 1997, 2934 : 59 - 67