Suspect Vehicle Identification for Border Safety

  • Siddharth Kaza
  • Hsinchun Chen
Part of the Studies in Computational Intelligence book series (SCI, volume 135)


Border safety is a critical part of national and international security. The U.S. Department of Homeland Security searches vehicles entering the country at land borders for drugs and other contraband. Customs and Border Protection (CBP) agents believe that such vehicles operate in groups and if the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify vehicles that may be involved in criminal activity. CBP agents also suggest that criminal vehicles may cross at certain times or ports to try and evade inspection. In a partnership with border-area law enforcement agencies and CBP, we include these heuristics in the MI formulation and identify suspect vehicles using large-scale, real-world data collections. Statistical tests and selected cases judged by domain experts show that the heuristic-enhanced MI performs significantly better than classical MI in identifying pairs of potentially criminal vehicles. The techniques described can be used to assist CBP agents perform their functions both efficiently and effectively.


Mutual Information Association Rule Association Rule Mining Homeland Security Police Contact 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in large Databases. In: ACM SIGMOD Conference on Management of Data. ACM Press, New York (1993)Google Scholar
  2. 2.
    Agrawal, R., Shafer, J.C.: Parallel Mining of Association Rules. IEEE Transactions on Knowledge and Data Engineering 8, 962–969 (1996)CrossRefGoogle Scholar
  3. 3.
    Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: 20th Int. Conf. Very Large Data Bases, VLDB (1994)Google Scholar
  4. 4.
    Battiti, R.: Using Mutual Information for Selecting Features in Supervised Neural Net Learning. IEEE Transactions on Neural Networks 5 (1994)Google Scholar
  5. 5.
    Berrar, D., Dubitzky, W., Granzow, M., Eils, R.: Analysis of Gene Expression and Drug Activity Data by Knowledge-Based Association Mining. In: Critical Assessment of Microarray Data Analysis Techniques (CAMDA 2001). Springer, Berlin (2001)Google Scholar
  6. 6.
    Brown, D.E., Hagen, S.: Data Association Methods with Applications to Law Enforcement. Decision Support Systems 34, 369–378 (2003)CrossRefGoogle Scholar
  7. 7.
    Chen, H.: Intelligence and Security Informatics for International Security. Springer, Berlin (2006)Google Scholar
  8. 8.
    Chruch, K.W., Hanks, P.: Word Association Norms, Mutual Information, and Lexicography. Computational Linguistics 16, 22–29 (1990)Google Scholar
  9. 9.
    Claude, S., Weaver, E.: The Mathematical Theory of Communication. University of Illinois Press, Chicago (1949)zbMATHGoogle Scholar
  10. 10.
    Fano, R.M.: Transmission of Information. MIT Press, Cambridge (1961)Google Scholar
  11. 11.
    Fleuret, F.: Fast Binary Feature Selection with Conditional Mutual Information. Journal of Machine Learning Research 5 (2004)Google Scholar
  12. 12.
    Han, J., Fu, Y.: Mining Multiple-level Association Rules in Large Databases. IEEE Transactions on Knowledge and Data Engineering 11, 798–805 (1999)CrossRefGoogle Scholar
  13. 13.
    Hilderman, R.J., Carter, C.L., Hamilton, H.J., Cercone, N.: Mining Association Rules from Market Basket Data using Share Measures and Characterized Itemsets. In: Wu, X., Kotagiri, R., Korb, K.B. (eds.) PAKDD 1998. LNCS, vol. 1394. Springer, Heidelberg (1998)Google Scholar
  14. 14.
    Hindle, D.: Noun Classification from Predicate-Argument Structures. In: 28th Conference on Association for Computational Linguistics (1990)Google Scholar
  15. 15.
    Hipp, J., Guntzer, U., Nakhaeizadeh, G.: Algorithms for Association Rule Mining - A General Survey and Comparison. SIGKDD Explorations 2, 58 (2000)CrossRefGoogle Scholar
  16. 16.
    Huang, Z., Li, J., Su, H., Watts, G.S., Chen, H.: Large-scale Regulatory Network Analysis from Microarray Data: Modified Bayesian Network Learning and Association Rule Mining. Decision Support Systems (in press, 2006)Google Scholar
  17. 17.
    Javed, A., Khokhar, A.: Frequent Pattern Mining on Message Passing Multiprocessor Systems. Distrib. Parallel Databases 16, 321–334 (2004)CrossRefGoogle Scholar
  18. 18.
    Jung, S.Y., Hong, J.H., Kim, T.S.: A statistical model for user preference. Knowledge and Data Engineering, IEEE Transactions 17, 834–843 (2005)CrossRefGoogle Scholar
  19. 19.
    Kaza, S., Wang, T., Gowda, H., Chen, H.: Target Vehicle Identification for Border Safety using Mutual Information. In: Proceedings of the 8th International IEEE Con-ference on Intelligent Transportation Systems. IEEE Press, New York (2005)Google Scholar
  20. 20.
    Kaza, S., Wang, Y., Chen, H.: Target Vehicle Identification for Border Safety with Modified Mutual Information. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  21. 21.
    Kaza, S., Wang, Y., Chen, H.: Enhancing Border Security: Mutual Information Analysis to Identify Suspect Vehicles. Decision Support Systems (in press, 2006)Google Scholar
  22. 22.
    Kwak, N., Choi, C.H.: Feature extraction based on ICA for binary classification problems. Knowledge and Data Engineering, IEEE Transactions 15, 1374–1388 (2003)CrossRefGoogle Scholar
  23. 23.
    Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: 7th USENIX Security Symposium (1998)Google Scholar
  24. 24.
    Lin, W., Alvarez, S.A., Ruiz, C.: Efficient Adaptive-Support Association Rule Min-ing for Recommender Systems. Data Mining and Knowledge Discovery 6, 83–105 (2002)CrossRefMathSciNetGoogle Scholar
  25. 25.
    Magerman, D.M., Marcus, M.P.: Parsing a Natural Language using Mutual Information Statistics. In: Proceedings of the Eighth National Conference on Artificial Intelligence. AAAI Press, Menlo Park (1990)Google Scholar
  26. 26.
    Marshall, B., Kaza, S., Xu, J., Atabakhsh, H., Petersen, T., Violette, C., Chen, H.: Cross-Jurisdictional Criminal Activity Networks to Support Border and Transportation Security. In: Proceedings of the 7th International IEEE Conference on Intelligent Transportation Systems. IEEE Press, New York (2004)Google Scholar
  27. 27.
    Mobasher, B., Jain, N., Han, E.H., Srivastava, J.: Web mining: Pattern discovery from world wide web transactions. Department of Computer Science, University of Minnesota, Minneapolis (1996)Google Scholar
  28. 28.
    Office of Homeland Security, National Strategy for Homeland Security (2002)Google Scholar
  29. 29.
    Omiecinski, E.R.: Alternative Interest Measures for Mining Associations in Data-bases. IEEE Transactions on Knowledge and Data Engineering 15, 57–69 (2003)CrossRefGoogle Scholar
  30. 30.
    Ong, T., Chen, H.: Updateable PAT-Tree Approach to Chinese Key Phrase Extrac-tion Using Mutual Information: A Linguistic Foundation for Knowledge Management. In: Second Asian Digital Library Conference, Taipei, Taiwan (1999)Google Scholar
  31. 31.
    Pantel, P., Philpot, A., Hovy, E.: Aligning Database Columns using Mutual Information. In: Proceedings of the 6th National Conference on Digital Government Research (dg.o), Los Angeles, DGRC (2005)Google Scholar
  32. 32.
    Song, M., Rajasekaran, S.: A Transaction Mapping Algorithm for Frequent Item-sets Mining. IEEE Transactions on Knowledge and Data Engineering 18, 472–481 (2006)CrossRefGoogle Scholar
  33. 33.
    Srikant, R., Agrawal, R.: Mining Generalized Association Rules. In: 21st Conf. on Very Large Databases, Zurich, Switzerland (1995)Google Scholar
  34. 34.
    Srikant, R., Agrawal, R.: Mining Quantitative Association Rules in Large Relational Tables. In: ACM SIGMOD Conf. on Management of Data, Canada (1996)Google Scholar
  35. 35.
    Srikant, R., Vu, Q., Agrawal, R.: Mining Association Rules with Item Constraints. In: Proceedings of the 3rd International Conf. on KDD and Data Mining (KDD 1997), Newport Beach, CA (1997)Google Scholar
  36. 36.
    Stonebraker, M., Agrawal, R., Dayal, U., Neuhold, E., Reuter, A.: The DBMS Research at Crossroads. In: The VLDB Conference, Morgan Kaufmann, San Francisco (1993)Google Scholar
  37. 37.
    Tao, T., Zhai, C.X., Lu, X., Fang, H.: A study of statistical methods for function prediction of protein motifs. Applied Bioinformatics 3, 115–124 (2004)CrossRefGoogle Scholar
  38. 38.
    Weisser, D., Klein-Seetharaman, J.: Identification of Fundamental Building Blocks in Protein Sequences Using Statistical Association Measures. In: ACM Symposium on Applied Computing, Nicosia, Cyprus (2004)Google Scholar
  39. 39.
    Woon, Y.K., Ng, W.K., Lim, E.P.: A support-ordered trie for fast frequent itemset discovery. Knowledge and Data Engineering, IEEE Transactions 16, 875–879 (2004)CrossRefGoogle Scholar
  40. 40.
    Wren, J.D.: Extending the Mutual Information Measure to Rank Inferred Literature Relationships. BMC Bioinformatics 5 (2004)Google Scholar
  41. 41.
    Zaki, M.J., Parthasarathy, S., Ogihara, M., Li, W.: New Algorithms for Fast Discovery of Association Rules. In: 3rd International Conf. on KDD and Data Mining (KDD 1997), Newport Beach, CA (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Siddharth Kaza
    • 1
  • Hsinchun Chen
    • 1
  1. 1.Department of Management Information SystemsUniversity of ArizonaUSA

Personalised recommendations