Illegal and Harmful Information Detection Technique Using Combination of Search Words

Vol. 26, No. 2, pp. 397-404, Apr. 2016
10.13089/JKIISC.2016.26.2.397, Full Text:
Keywords: OSINT, Inteligence, illegal drug, Google, Security, Criminal detection, Automatic detection
Abstract

Illegal and harmful contents on the Internet has been an issue and been increased in Korea. They are often posted on the billboard and website of small enterprise and government office. Those illegal and harmful contents can relate to crime and suspicious activity, so, we need a detection system. However, to date the detection itself has been conducted manually by a person. In this paper, we develop an automated URL detection scheme for detecting a drug trafficking by using Google. This system works by analyzing the frequently used keywords in a drug trafficking and generate a keyword dictionary to store words for future search. The suspected drug trafficking URL are automatically collected based on the keyword dictionary by using Google search engine. The suspicious URL can be detected by classifying and numbering each domain from the collection of the suspected URL. This proposed automated URL detection can be an effective solution for detecting a drug trafficking, also reducing time and effort consumed by human-based URL detection.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
B. W. Han and J. W. Yoon, "Illegal and Harmful Information Detection Technique Using Combination of Search Words," Journal of The Korea Institute of Information Security and Cryptology, vol. 26, no. 2, pp. 397-404, 2016. DOI: 10.13089/JKIISC.2016.26.2.397.

[ACM Style]
Byeong Woo Han and Ji Won Yoon. 2016. Illegal and Harmful Information Detection Technique Using Combination of Search Words. Journal of The Korea Institute of Information Security and Cryptology, 26, 2, (2016), 397-404. DOI: 10.13089/JKIISC.2016.26.2.397.