Advance algorithms used to detect online behaviour trends

August 16, 2012

Money laundering and other suspicious behaviours will become more detectable with the refinement of a 2D graphic visualisation tool currently under development at the University of Sydney's Faculty of Engineering and Information Technologies.

Super-fast algorithms that will allow IT security analysts to detect an eclectic range of abnormal behaviours are being created by Professor Seok-Hee Hong.

Professor Hong, who received a Future Fellowship from the Australian Research Council to enhance her work in this area, says technological advances are increasing data exponentially, resulting in massive, complex networks.

Graph drawing, or visualisation, is the science and art of creating good geometric representations of a graph. Good visualisation can amplify human cognition; reveal the hidden structure of a network, and thereby lead to new insights, findings or predictions, says Professor Hong.

Many real world networks can be modelled mathematically as 'graphs'. These include networks that are common to many of us, such as Facebook, Twitter, and Wikipedia, Professor Hong states.

"The algorithms we are constructing will have the potential to assist police and security specialists to monitor and analyse, for example, mobile telephone calls or internet , using 2D graphs."

"To be used as evidence, these 'graphic visualisations' need to convey information faithfully. We already know that good visualisations have some geometric properties, called aesthetic criteria, including few edge crossings, good area resolution - small area in 2D and small volume in 3D - low curve complexity with few bends per edge, and a high degree of symmetry.

"The challenge we are trying to overcome is the design of a central tool with the clarity and definition to carry out analysis, enabling businesses, researchers and other dataset users to explore datasets to identify patterns, associations or trends," states Professor Hong.

The work being conducted by Professor Hong will also be applicable to biomedical networks such as protein-to-protein interaction biochemical pathways, and gene regulatory networks.

Explore further: New tool could unpick complex cancer causes and help sociologists mine Facebook

Related Stories

'Fourth generation' Internet arrives in Hong Kong

November 26, 2010

The latest generation of wireless Internet that will allow people to watch a crystal clear movie or live sporting event on the street or atop a hill is being deployed throughout Hong Kong.

Hong Kong's e-economy booming: Google

May 5, 2011

The Internet is expected to contribute around $18.8 billion -- 7.2 percent of the total -- to Hong Kong's economy by 2015, driven by a surge in mobile use and online shopping, a report for Google said.

Why rumors spread fast in social networks

May 21, 2012

Information spreads fast in social networks. This could be observed during recent events. Now computer scientists from the German Saarland University provide the mathematical proof for this and come up with a surprising explanation.

Recommended for you

Netherlands bank customers can get vocal on payments

August 1, 2015

Are some people fed up with remembering and using passwords and PINs to make it though the day? Those who have had enough would prefer to do without them. For mobile tasks that involve banking, though, it is obvious that ...

Power grid forecasting tool reduces costly errors

July 30, 2015

Accurately forecasting future electricity needs is tricky, with sudden weather changes and other variables impacting projections minute by minute. Errors can have grave repercussions, from blackouts to high market costs. ...

Microsoft describes hard-to-mimic authentication gesture

August 1, 2015

Photos. Messages. Bank account codes. And so much more—sit on a person's mobile device, and the question is, how to secure them without having to depend on lengthy password codes of letters and numbers. Vendors promoting ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.