Advance algorithms used to detect online behaviour trends

Aug 16, 2012

Money laundering and other suspicious behaviours will become more detectable with the refinement of a 2D graphic visualisation tool currently under development at the University of Sydney's Faculty of Engineering and Information Technologies.

Super-fast algorithms that will allow IT security analysts to detect an eclectic range of abnormal behaviours are being created by Professor Seok-Hee Hong.

Professor Hong, who received a Future Fellowship from the Australian Research Council to enhance her work in this area, says technological advances are increasing data exponentially, resulting in massive, complex networks.

Graph drawing, or visualisation, is the science and art of creating good geometric representations of a graph. Good visualisation can amplify human cognition; reveal the hidden structure of a network, and thereby lead to new insights, findings or predictions, says Professor Hong.

Many real world networks can be modelled mathematically as 'graphs'. These include networks that are common to many of us, such as Facebook, Twitter, and Wikipedia, Professor Hong states.

"The algorithms we are constructing will have the potential to assist police and security specialists to monitor and analyse, for example, mobile telephone calls or internet , using 2D graphs."

"To be used as evidence, these 'graphic visualisations' need to convey information faithfully. We already know that good visualisations have some geometric properties, called aesthetic criteria, including few edge crossings, good area resolution - small area in 2D and small volume in 3D - low curve complexity with few bends per edge, and a high degree of symmetry.

"The challenge we are trying to overcome is the design of a central tool with the clarity and definition to carry out analysis, enabling businesses, researchers and other dataset users to explore datasets to identify patterns, associations or trends," states Professor Hong.

The work being conducted by Professor Hong will also be applicable to biomedical networks such as protein-to-protein interaction biochemical pathways, and gene regulatory networks.

Explore further: Coping with floods—of water and data

add to favorites email to friend print save as pdf

Related Stories

Why rumors spread fast in social networks

May 21, 2012

Information spreads fast in social networks. This could be observed during recent events. Now computer scientists from the German Saarland University provide the mathematical proof for this and come up with a surprising explanation.

'Fourth generation' Internet arrives in Hong Kong

Nov 26, 2010

The latest generation of wireless Internet that will allow people to watch a crystal clear movie or live sporting event on the street or atop a hill is being deployed throughout Hong Kong.

Hong Kong's e-economy booming: Google

May 05, 2011

The Internet is expected to contribute around $18.8 billion -- 7.2 percent of the total -- to Hong Kong's economy by 2015, driven by a surge in mobile use and online shopping, a report for Google said.

Recommended for you

Coping with floods—of water and data

10 hours ago

Halloween 2013 brought real terror to an Austin, Texas, neighborhood, when a flash flood killed four residents and damaged roughly 1,200 homes. Following torrential rains, Onion Creek swept over its banks and inundated the ...

Cloud computing helps make sense of cloud forests

Dec 17, 2014

The forests that surround Campos do Jordao are among the foggiest places on Earth. With a canopy shrouded in mist much of time, these are the renowned cloud forests of the Brazilian state of São Paulo. It is here that researchers ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.