Data Mining and Integration Technologies for Information Exploitation
Small Business Information
8302 Lincoln Lane, Suite 103, Mclean, VA, 22101
AbstractWe shall deliver an information exploitation demonstration prototype simulatirsg actual rlata exploitation. Within this prototype we shall deliver five different types of capabilities. The first three capabilities are data mining tools. These tools shall demonstrate the capability of identifying electronic patterns or f ingerprints in data, relationships between data, and visualizations of such data. The fourth capability consists of an informaton exploitation database. This database shall contain mined data from the Internet representing potential threats or targets. The data mining tools shall use data from this database and the internet to determine new and unique information in the form of patterns and relationships. The fifth capability, the MAVIS sy+;tcrn, is an in house data integration tool used by the US Army CECOM and US Navy Spawar. We shall use this capability to demonstrate how data may be integrated to enhance the exploitation process. Finally, we present an information exploitation architecture, from which this demonstration tool can be operationally deployed.
* information listed above is at the time of submission.