Ítem
Acceso Abierto

FCTNLP: Fighting cyberterrorism with natural language processing

dc.contributor.advisorDíaz López, Daniel Orlando
dc.creatorZapata Rozo, Andrés Felipe
dc.creator.degreeProfesional en Matemáticas Aplicadas y Ciencias de la Computaciónes
dc.creator.degreeLevelPregrado
dc.creator.degreetypeFull timees
dc.date.accessioned2022-08-22T19:11:40Z
dc.date.available2022-08-22T19:11:40Z
dc.date.created2021-11-26
dc.descriptionLas redes sociales son una rica fuente de datos y han sido utilizadas para promover u organizar ciberdelitos que afectan al mundo real. Por ello, las fuerzas del orden se interesan por la información crucial que puede obtenerse de estas fuentes. La cantidad de información y el lenguaje informal que se utiliza para difundir la información hace que el Procesamiento del Lenguaje Natural (PLN) sea una excelente herramienta para realizar análisis sobre las publicaciones en las redes sociales. Por ello, en esta propuesta se integra una arquitectura con tres modelos de PLN para proporcionar un análisis exhaustivo de fuentes abiertas como los medios sociales. Este análisis extrae entidades del texto, identifica clusters de usuarios y su respectiva polaridad, finalmente todos los resultados se relacionan en una base de datos gráfica. Esta arquitectura se puso a prueba utilizando datos de un escenario real para determinar su viabilidad.es
dc.description.abstractThe social networks are a rich source of data and have been used to promote or organize cybercrimes that affect the real world. Because of this, the law enforcement agency are interest in the crucial information that can be get on this sources. The amount of information and the informal language which is used to spread information makes the Natural Language Processing (NLP) and excellent tool to make analysis over post in social media. That is why, in this proposal an architecture with three NLP models are integrated to provide an exhaustive analysis from open sources like social media. This analysis extract entities from the text, identifies clusters of users and their respective polarity, finally all of the results are related in a graph database. This architecture was under test using data from a real scenario in order to determine their feasibility.es
dc.format.extent26 ppes
dc.format.mimetypeapplication/pdfes
dc.identifier.doihttps://doi.org/10.48713/10336_34736
dc.identifier.urihttps://repository.urosario.edu.co/handle/10336/34736
dc.language.isoenges
dc.publisherUniversidad del Rosario
dc.publisher.departmentEscuela de Ingeniería, Ciencia y Tecnología
dc.publisher.programPrograma de Matemáticas Aplicadas y Ciencias de la Computación - MACC
dc.rights.accesRightsinfo:eu-repo/semantics/openAccesses
dc.rights.accesoAbierto (Texto Completo)es
dc.source.bibliographicCitationCouncil of Europe. Explanatory Report to the Convention on Cybercrime. https://rm.coe.int/CoERMPublicCommonSearc hServices/DisplayDCTMContent?documentId=09000016800c ce5b. 2001.es
dc.source.bibliographicCitationAkhilesh Chandra and Melissa J. Snowe. “A taxonomy of cybercrime: Theory and design”. In: International Journal of Accounting Information Systems 38 (2020). 2019 UW CISA Symposium, p. 100467. issn: 1467-0895. doi: 10.1016/j.acc inf.2020.100467. url: https://www.sciencedirect.com/sc ience/article/pii/S1467089520300348.es
dc.source.bibliographicCitationJo˜ao Rafael Gon¸calves Evangelista et al. “Systematic literature review to investigate the application of open source intelligence (osint) with artificial intelligence”. In: Journal of Applied Security Research (2020), pp. 1–25.es
dc.source.bibliographicCitationHeather J Williams and Ilana Blum. Defining second generation open source intelligence (OSINT) for the defense enterprise. Tech. rep. RAND Corporation Santa Monica United States, 2018.es
dc.source.bibliographicCitationJavier Pastor-Galindo et al. “The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends”. In: IEEE Access 8 (2020), pp. 10282–10304. doi: 10.1109/ACCESS.2020.2965257.es
dc.source.bibliographicCitationA. Thomas. Natural Language Processing with Spark NLP: Learning to Understand Text at Scale. O’Reilly Media, 2020. isbn: 9781492047766. url: https://books.google.com.co/b ooks?id=sJw6zQEACAAJ.es
dc.source.bibliographicCitationLeigh Clark et al. “What Makes a Good Conversation? Challenges in Designing Truly Conversational Agents”. In: New York, NY, USA: Association for Computing Machinery, 2019, 1–12. isbn: 9781450359702. url: 10.1145.3290605.3300705.es
dc.source.bibliographicCitationSwati Kumari, Zia Saquib, and Sanjay Pawar. Machine Learning Approach for Text Classification in Cybercrime. 2018. doi: 10.1109/ICCUBEA.2018.8697442.es
dc.source.bibliographicCitationC. S´anchez-Rebollo et al. “Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering”. In: Hindawi 2019.1238780 (2019), p. 13. doi: 10.1155.2019.1238780es
dc.source.bibliographicCitationIbrahim Aljarah et al. “Intelligent detection of hate speech in Arabic social network: A machine learning approach”. In: Journal of Information Science 47.4 (2021), pp. 483–501. doi: 10.1177/0165551520917651. eprint: https://doi.org/10.11 77/0165551520917651. url: https://doi.org/10.1177/0165 551520917651.es
dc.source.bibliographicCitationIv´an Castillo-Z´u˜niga et al. “Internet Data Analysis Methodology for Cyberterrorism Vocabulary Detection, Combining Techniques of Big Data Analytics, NLP and Semantic Web”. In: International Journal on Semantic Web and Information Systems 16 (Jan. 2020), pp. 69–86. doi: 10.4018/IJSWIS.20 20010104.es
dc.source.bibliographicCitationC Oleji et al. “Big data Analitic of Boko Haram insurgency attacks menace in nigeria using DynamicK-reference clustering algorithm”. In: 7 (Apr. 2020), pp. 1099–1107.es
dc.source.bibliographicCitationV. N. Uzel, E. Sara¸c E¸ssiz, and S. Ay¸se Ozel. “Using Fuzzy ¨ Sets for Detecting Cyber Terrorism and Extremism in the Text”. In: 2018 Innovations in Intelligent Systems and Applications Conference (ASYU). 2018, pp. 1–4. doi: 10.1109 /ASYU.2018.8554017.es
dc.source.bibliographicCitationSanjeev J Wagh, Manisha S Bhende, and Anuradha D Thakare. Fundamentals of Data Science. Chapman and Hall/CRC, 2021, p. 14.es
dc.source.instnameinstname:Universidad del Rosario
dc.source.reponamereponame:Repositorio Institucional EdocUR
dc.subjectOSINTes
dc.subjectNERes
dc.subjectCiberterrorismoes
dc.subjectProcesamiento de Lenguaje Naturales
dc.subjectSimilitud semánticaes
dc.subjectAnálisis de sentimientoses
dc.subject.ddcMatemáticases
dc.subject.keywordCyberterrorismes
dc.subject.keywordOSINTes
dc.subject.keywordNLPes
dc.subject.keywordNERes
dc.subject.keywordNatural Language Processinges
dc.subject.keywordSentiment Analysises
dc.subject.keywordSemantic Similarityes
dc.titleFCTNLP: Fighting cyberterrorism with natural language processinges
dc.title.TranslatedTitleFCTNLP: Luchando contra el ciberterrorismo con procesamiento de lenguaje naturales
dc.typebachelorThesises
dc.type.documentTrabajo de gradoes
dc.type.hasVersioninfo:eu-repo/semantics/acceptedVersion
dc.type.spaTrabajo de gradoes
Archivos
Bloque original
Mostrando1 - 1 de 1
Cargando...
Miniatura
Nombre:
ZapataRozo-AndresFelipe-2021.pdf
Tamaño:
3.98 MB
Formato:
Adobe Portable Document Format
Descripción: