Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic...

21
Detecting Related Message Detecting Related Message Traffic Traffic David Skillicorn David Skillicorn School of Computing, Queen’s University School of Computing, Queen’s University Math and CS, Royal Military College Math and CS, Royal Military College [email protected] [email protected]

Transcript of Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic...

Page 1: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

Detecting Related Message Detecting Related Message TrafficTraffic

David SkillicornDavid SkillicornSchool of Computing, Queen’s UniversitySchool of Computing, Queen’s University

Math and CS, Royal Military CollegeMath and CS, Royal Military [email protected]@cs.queensu.ca

Page 2: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

The problem:

Connect intercepted messages into conversations when conventional markers (sender/receivers etc.) are missing.

The solution:

Look for correlated use of words that are used with the “wrong” frequency.

The technique:

Use singular value decomposition and independent component analysis applied to noun frequency profiles; suspicious related messagesappear as outliers.

Why it’s interesting:

Applications in counterterrorism (also fraud).

Page 3: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

THE PROBLEM

Page 4: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

Many governments collect and analyze message traffic (e.g.Echelon) – email, file traffic/web, cellphone traffic, radio.

There are 3 analysis strategies:

1. Match the content of individual messages against a watch list of words that suggest the message is suspicious.

German Federal Intelligence Service: nuclear proliferation (2000terms), arms trade (1000), terrorism (500), drugs (400), as of 2000 (certainly changed now).

Countermeasures: use a speech code (hard in realtime) or use locutions (“the package is ready”).

Page 5: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

2. Look for sets of messages that are connected, that form a conversation, based on some of their properties: sender/receiveridentities, time of transmission, specialized word use, etc..(Social Network Analysis)

Countermeasures: conceal the connections between the messages bymaking sure they share no obvious attributes:

* use temporary email addresses, stolen cell phones* decouple by using intermediaries* smear time factors e.g. by using web sites

In general, hide in the background noise .

Page 6: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

3. Look for sets of messages that are connected in more subtle ways because of correlation among their properties.

Workable countermeasures are hard to find because:* conversations are about something, so that correlation in their

content arises naturally* sensitivity to watch list surveillance alters the way words are used

We hypothesize that related messages among a threat group in thecontext of watch list surveillance will be characterized by correlated word use; and that the words will be used with the “wrong” frequencies.

Common words will be used as if they were uncommon; uncommon words will be used as if they were common.

Page 7: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

THE DATA

Page 8: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

The frequency of words in English (and many other languages) is Zipf– frequent words are very frequent, and frequency drops off very quickly.

We restrict our attention to nouns.

In EnglishMost common noun – time3262nd most common noun – quantum

We assume that messages are reduced to a frequency histogram of their nouns (this can be done reliably with a tagger).

Page 9: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

The dataset has a row corresponding to each message, and a column corresponding to each noun. The ij th entry is the frequency of noun jin message i .

The matrix is very sparse.

We generate artificial datasets using a Poisson distribution with mean f * 1/j+1 , where f models the base frequency.

We add 10 extra rows representing the correlated threat messages, using a block of 6 columns, uniformly randomly 0s and 1s, added at columns 301—306.

Page 10: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

50 100 150 200 250 300 350 400

100

200

300

400

500

600

700

800

900

1000

messages

nouns

Page 11: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

THE TECHNIQUES

Page 12: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

Matrix decompositions.

The basic idea:* Treat the dataset as a matrix, A, with n rows and m columns;* Factor A into the product of two matrices, C and F

A = C Fwhere C is n x r, F is r x m and r is smaller than m.

Think of F as a set of underlying `real’ somethings and C as a way of `mixing’ these somethings together to get the observed attribute values. Choosing r smaller than m forces the decomposition to somehow represent the data more compactly.

F A = C

Page 13: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

Two matrix decompositions are useful :

Singular value decomposition (SVD) – the rows of F are orthogonal axes such that the maximum possible variation in the data lies along the first axis; the maximum of what remains along the second, and so on. The rows of C are coordinates in this space.

Independent component analysis (ICA) – the rows of F are statistically independent factors. The rows of C describe how to mix these factors to produce the original data.

Strictly speaking, the row of C are not coordinates, but we can plot them to get some idea of structure.

Page 14: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

−0.25−0.2

−0.15−0.1

−0.050

0.050.1

−0.3

−0.2

−0.1

0

0.1

0.2

−0.4

−0.3

−0.2

−0.1

0

0.1

0.2

0.3

U2

U1

U3

The messages with correlated unusual word usage are marked with red circles

First 3 dimensions – SVD

Page 15: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

−10

−5

0

5

10

−20

24

68

1012

−4

−2

0

2

4

6

8

10

I2I1

I3

First 3 dimensions – ICA

Page 16: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

(Fortunately) both unusual word use and correlated word use are necessary to make such messages detectable.

−0.14−0.12

−0.1−0.08

−0.06−0.04

−0.020

0.02

−0.4

−0.3

−0.2

−0.1

0

0.1

−0.2

−0.1

0

0.1

0.2

0.3

U2

U1

U3

Correlation with proper word frequencies (SVD)

So ordinary conversations don’t show up as false positives!!

Page 17: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

−4

−2

0

2

4

6

8

10

−4−2

02

46

810

−4

−2

0

2

4

6

8

10

12

I2I1

I3Correlation with proper word frequencies (ICA)

Page 18: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

−0.12−0.1

−0.08−0.06

−0.04−0.02

00.02

−0.2

−0.1

0

0.1

0.2

0.3

−0.25

−0.2

−0.15

−0.1

−0.05

0

0.05

0.1

0.15

0.2

U2

U1

U3

Uncorrelated with unusual word frequencies (SVD)

Conversations about unusual things don’t show up as false positives either!!

Page 19: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

−4−2

02

46

810

−5

0

5

10

15

−2

0

2

4

6

8

10

I2

I1

I3

Uncorrelated with unusual word frequencies (ICA)

Page 20: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military

This trick permits a new level of sophistication in connecting related messages into conversations when the usual indicators are not available.

It does exactly the right thing – ignoring conversations about ordinary topics, and conversations about unusual topics, but homing in on conversations about unusual topics using inappropriate words.

Because the dataset is sparse, SVD takes time linear in the number of messages. The complexity of ICA is less clear but there are direct hardware implementations.

Page 21: Detecting Related Message Trafficlazar027/sdm04w/skillicorn.pdfDetecting Related Message Traffic David Skillicorn School of Computing, Queen’s University Math and CS, Royal Military