Skip to main content

Advertisement

Log in

Bees colonies for terrorist communities evolution detection

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

In recent decades, the world of social media became the most popular. Social media have transformed the world. The rapid and large choice of these technologies is transforming how we find communities, how we get information from the news. According to this growth of social media, cyber terrorism has become an international issue that threatens world peace. Cyberterrorism is becoming more famous on social media now. While the Internet grows more pervasive in every area interested users or organizations can use the anonymity provided by cyberspace to terrorize citizens, communities, specific groups, and entire countries, without the internal threat of capture, damage, or death to the criminal that being physically existing would begin. Besides, Social network analysis plays a key research field for detecting different groups in a cyber-terrorist network. Many researchers are interested to find these communities, the managers, and the influencers which present a predictive way to protect users of social media networks. Then, the enormous evolution of terrorist communities over time presents a big problem to analyze and detect them. In this article, we introduce a new method for communities detection according to the network of contact, the publications, and their evolution based on Twitter as a social network. Also, we find the managers and the influencers in terrorist communities using swarm techniques. Our proposed method object is to optimize our proposed objective function to have a coherent partitioning inspired by the artificial bees comportment and using the data warehouse to save data in every evolution over time. Finally, we illustrate the performance of our proposed method by an experimental study on the real and artificial network and with a comparative study with the same related recent works. We test the performance of our approach by applying different quality functions on the terrorist communities detected.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Notes

  1. BCTTC is an acronym for Bee colonies for Tracking Terrorist Communities

  2. http://140dev.com/free-Twitter-API-source-code-library/

References

  • Brandes U, Gaertler M (2003) Experiments on graph clustering algorithms. LNCS 14(1):51–65

    Google Scholar 

  • Carley KM, Lee J-S, Krackhardt D (2002) Destabilizing networks. Connections 24(3):79–92

    Google Scholar 

  • Chaabani Y, Akaichi J (2016) Bees colonies for meaningfull communities detection in social medias network. In: 2016 International IEEE conferences on ubiquitous intelligence and computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress (UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld)

  • Chaabani Y, Akaichi J (2017) Meaningful communities detection in medias network. Soc Netw Anal Min 7(1):11

    Article  Google Scholar 

  • Chaurasia N, Dhakar M, Tiwari A, Gupta RK (2012) A survey on terrorist network mining: current trends and opportunities. Int J Comput Sci Eng Surv 3(4):59

    Article  Google Scholar 

  • Dutta S, Ghatak S, Roy M, Ghosh S, Das AK (2015) A graph based clustering technique for tweet summarization. pp 1–6

  • Edith W, Carleton R, Davies G (2014) Discovering bin-laden’s replacement in al-qaeda, using social network analysis: a methodological investigation. Perspect Terror 8(1):57–73

  • Everett MG, Borgatti SP (1999) The centrality of groups and classes. J Math Sociol 23(3):181–201

    Article  MATH  Google Scholar 

  • Everton SF (2009) Network topography, key players and terrorist networks

  • Everton SF, Cunningham D (2013) Detecting significant changes in dark networks. Behav Sci Terror Polit Aggress 5(2):94–114

    Article  Google Scholar 

  • Everton SF, Cunningham D (2013) Terrorist network adaptation to a changing environment. Crime and networks pp. 287–308

  • Ferrara E, De Meo P, Catanese S, Fiumara G (2014) Detecting criminal organizations in mobile phone networks. Exp Syst Appl 41(13):5733–5750

    Article  Google Scholar 

  • Fortunato San Benchmark graphs to test community detection algorithms. http://sites.google.com/site/santofortunato/inthepress2

  • Gialampoukidis I, Kalpakis G, Tsikrika T, Papadopoulos S, Stefanos V, and Ioannis K (2017) Detection of terrorism-related twitter communities using centrality scores. pp 21–25

  • Goddard C (2011) Semantic analysis: a practical introduction. Oxford University Press, Oxford

    Google Scholar 

  • Gulbahce N, Lehmann S (2008) The art of community detection. BioEssays 30(10):934–938

    Article  Google Scholar 

  • In: Actes du 8e symposium international sur la recherche et la technologie du commandement et du contrôle

  • Jennifer X, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100–107

    Article  Google Scholar 

  • Karthika S, Bose S (2011) Analyzing various social networking approaches for covert networks. Springer, Berlin, pp 558–566

    Google Scholar 

  • Kim Y, Son S-W, Jeong H (2010) Finding communities in directed networks. Phys Rev E 81:016103

    Article  Google Scholar 

  • Knoke D (2015) Emerging trends in social network analysis of terrorism and counterterrorism. Emerging trends in the social and behavioral sciences: an interdisciplinary, searchable, and linkable. Resource

  • Koschade S (2006) A social network analysis of jemaah islamiyah: the applications to counterterrorism and intelligence. Stud Conflict Terror 29(6):559–575

    Article  Google Scholar 

  • Krebs VE (2002) Mapping networks of terrorist cells. Connections 24(3):43–52

    Google Scholar 

  • Lancichinetti A, Fortunato S, Radicchi F (2008) Benchmark graphs for testing community detection algorithms. Phys Rev E 78(4):046110

    Article  Google Scholar 

  • Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031

    Article  Google Scholar 

  • Lucic P (2002) Modeling transportation problems using concepts of swarm intelligence and soft computing. Virginia Tech, Blacksburg (PhD thesis)

    Google Scholar 

  • Medina RM (2014) Social network analysis: a case study of the Islamist terrorist network. Sec J 27(1):97–121

    Article  Google Scholar 

  • Memon N, Larsen HL (2006) Practical algorithms for destabilizing terrorist networks. Springer, Berlin, pp 389–400

    Google Scholar 

  • Mullins S, Dolnik A (2010) An exploratory, dynamic application of social network analysis for modelling the development of islamist terror-cells in the west. Behav Sci Terror Polit Aggress 2(1):3–29

    Article  Google Scholar 

  • Nizamani S, Memon N (2014) Analyzing news summaries for identification of terrorism incident type. Educ Res Int 3(4):10

    Google Scholar 

  • Pang B, Lee L et al (2008) Opinion mining and sentiment analysis. Foundations and Trends. Information Retrieval 2(1–2):1–135

  • Ressler S (2006) Social network analysis as an approach to combat terrorism: past, present, and future research. Homeland Security Affairs 2(2)

  • Romdhane LB, Chaabani Y, Zardi H et al (2013) A robust ant colony optimization-based algorithm for community mining in large scale oriented social graphs. Exp Syst Appl 40(14):5709–5718

    Article  Google Scholar 

  • Sarvari H, Abozinadah E, Mbaziira A, Mccoy D (2014) Constructing and analyzing criminal networks. pp 84–91

  • The elements of statistical learning: data mining, inference, and prediction. J R Stat Soc Ser A, 173:693–694

  • Wiil UK, Gniadek J, Memon N (2010) Crimefighter assistant: a knowledge management tool for terrorist network analysis. In: international conference on knowledge management and information sharing institute for systems and technologies of information, control and communication, pp. 15–24

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Chaabani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chaabani, Y., Akaichi, J. Bees colonies for terrorist communities evolution detection. Soc. Netw. Anal. Min. 12, 8 (2022). https://doi.org/10.1007/s13278-021-00835-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-021-00835-y

Keywords

Navigation