Advertisement

Information Systems Frontiers

, Volume 20, Issue 5, pp 1053–1074 | Cite as

Multimode co-clustering for analyzing terrorist networks

  • Ahmed Aleroud
  • Aryya Gangopadhyay
Article

Abstract

The phenomenon of terrorism is deemed one of the fundamental challenges in national security. Creating defensive technologies to mitigate terrorist attacks requires a simultaneous investigation of contextual relationships among their various dimensions. We proposed and evaluated a graph-based methodology to analyze terrorist networks through co-clustering in a multimode basis. Since there are many heterogeneous relationships in terrorist networks depending on the dimensions used during analysis, we utilized the clustering indicators of the multimode structure discovered in bi- and multimode graphs. Objects and activities that co-occur during terrorist attacks are identified by applying conventional clustering on those indicators. The novelty of our method is in the incremental creation of the multimode structure using its bi-mode counterparts. Our approach is evaluated using these measures: clustering stability and association confidence. The experimental results yields encouraging results in terms of simultaneous clustering of heterogeneous objects in terrorist networks.

Keywords

Multimode clustering Terrorist networks Singular value decomposition k-means Social network analysis 

References

  1. Asadi, H., Mårtenson, C., Svenson, P., & Sköld, M. (2012) The HiTS/ISAC Social Network Analysis Tool. In European Intelligence and Security Informatics Conference (EISIC), (pp. 291–296). IEEE.Google Scholar
  2. Barnett, G. A., Ruiz, J. B., Hammond, J. R., & Xin, Z. (2013). An Examination of the Relationship Between International Telecommunication Networks, Terrorism and Global News Coverage. Social Network Analysis and Mining, 3(3), 721–747.CrossRefGoogle Scholar
  3. Basu, A. (2014). Social network analysis: a methodology for studying terrorism. In Social Networking (pp. 215–242). Springer.Google Scholar
  4. Bhattacharya, I., & Getoor, L. (2005) Relational Clustering for Multi-Type Entity Resolution. In Proceedings of the 4th International Workshop on Multi-Relational Mining (pp. 3–12). Chicago: ACM.Google Scholar
  5. Blake, A., & Sinclair, M. T. (2003). Tourism crisis management: US response to September 11. Annals of Tourism Research, 30(4), 813–832.CrossRefGoogle Scholar
  6. Carrington, P. J. (2011). Crime and Social Network Analysis. The SAGE handbook of social network analysis, (236–255).Google Scholar
  7. Carvalho, R. N., Haberlin, R., Costa, P. C. G., Laskey, K. B., & Chang, K.-C. (2011) Modeling a probabilistic ontology for maritime domain awareness. In 14th International Conference on Information Fusion (FUSION) (pp. 1–8). Chicago:IEEE.Google Scholar
  8. Chen, Y., Tseng, C., King, C., Wu, T. J., & Chen, H. (2007) Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study On Taiwan SARS Data. In Proceedings of the 2nd NSF conference on Intelligence and Security Informatics: BioSurveillance (pp. 23–36). 1768380, New Brunswick:Springer-Verlag.Google Scholar
  9. Chen, J., Xu, J., Chen, J., Ding, G., Lax, R. F., & Marx, B. D. (2008) Fuzzy clustering and iterative relational classification for terrorist profiling. In IEEE International Conference on Granular Computing (pp. 142–147). Hangzhou:IEEE.Google Scholar
  10. Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: from Big data to big impact. MIS quarterly, 36(4), 1165–1188.Google Scholar
  11. Cheong, M., & Lee, V. C. (2011). A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Information Systems Frontiers, 13(1), 45–59.CrossRefGoogle Scholar
  12. Chi, Y., Song, X., Zhou, D., Hino, K., & Tseng, B. L. (2009). On Evolutionary Spectral Clustering. ACM Transactions on Knowledge Discovery from Data (TKDD), 3(4), 17.CrossRefGoogle Scholar
  13. Dhillon, I. S. (2001) Co-Clustering Documents and Words Using Bipartite Spectral Graph Partitioning. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (pp. 269–274): ACM.Google Scholar
  14. Donath, W. E., & Hoffman, A. J. (1973). Lower bounds for the partitioning of graphs. IBM Journal of Research and Development, 17(5), 420–425.CrossRefGoogle Scholar
  15. Fellman, P. V. (2015). Modeling Terrorist Networks: The Second Decade. In Conflict and Complexity (pp. 3–34): Springer.Google Scholar
  16. Fellman, P. V., & Wright, R. (2003). Modeling terrorist networks, complex systems at the mid-range. Paper presented at the Joint Complexity Conference. London: School of Economics.Google Scholar
  17. Ferrara, E., De Meo, P., Catanese, S., & Fiumara, G. (2014). Detecting Criminal Organizations in Mobile Phone Networks. Expert Systems with Applications, 41(13), 5733–5750.CrossRefGoogle Scholar
  18. Ghani, S., Kwon, B. C., Lee, S., Yi, J. S., & Elmqvist, N. (2013). Visual analytics for multimodal social network analysis: a design study with social scientists. IEEE Transactions on Visualization and Computer Graphics, 19(12), 2032–2041.CrossRefGoogle Scholar
  19. Godwin, A., Chang, R., Kosara, R., & Ribarsky, W. (2008) Visual Analysis of Entity relationships in Global Terrorism Database. In Defense and Security: Special Sessions on Food Safety, Visual Analytics, Resource Restricted Embedded and Sensor Networks, and 3D Imaging and Display, (pp. 69830G. 69831-69830G. 69838): Society of Photo-Optical Instrumentation Engineers.Google Scholar
  20. Gorecki, J., Slaninova, K., & Snasel, V. (2011). Visual Investigation of Similarities in Global Terrorism Database by Means of Synthetic Social Networks. Paper presented at the 2011 International Conference on Computational Aspects of Social Networks (CASoN), Salamanca, 19–21 Oct. 2011.Google Scholar
  21. Gruenwald, L., McNutt, G., & Mercier, A. (2003) Using an Ontology to Improve Search in A Terrorism Database System. In 14th International Workshop on Database and Expert Systems Applications(DEXA ‘03), (pp. 753–757): IEEE.Google Scholar
  22. Guille, A., Hacid, H., Favre, C., & Zighed, D. A. (2013). Information diffusion in online social networks: a survey. ACM SIGMOD Record, 42(2), 17–28.CrossRefGoogle Scholar
  23. Hua, W., Feiping, N., Heng, H., & Ding, C. (2011) Nonnegative Matrix Tri-factorization Based High-Order Co-clustering and Its Fast Implementation. In IEEE 11th International Conference on Data Mining (ICDM’11), Vancouver, Canda, 11–14 Dec. 2011 (pp. 774–783). doi: 10.1109/icdm.2011.109.
  24. Jidong, W., Huajun, Z., Zheng, C., Hongjun, L., Li, T., & Wei-Ying, M. (2003) ReCoM: reinforcement clustering of multi-type interrelated data objects. In Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, (pp. 274–281): ACM.Google Scholar
  25. Kanungo, T., Mount, D. M., Netanyahu, N. S., Piatko, C. D., Silverman, R., & Wu, A. Y. (2002). An Efficient K-Means clustering algorithm: analysis and implementation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(7), 881–892.CrossRefGoogle Scholar
  26. Lawal, O. A. (2002). Social-psychological considerations in the emergence and growth of Terrorism (Vol. 4, The psychology of terrorism: Programs and practices in response and prevention): Praeger.Google Scholar
  27. Lei, T., Huan, L., & Jianping, Z. (2012). Identifying Evolving Groups in Dynamic Multimode Networks. IEEE Transactions on Knowledge and Data Engineering, 24(1), 72–85. doi: 10.1109/tkde.2011.159.CrossRefGoogle Scholar
  28. Li, J., Wang, G. A., & Chen, H. (2011). Identity matching using personal and social identity features. Information Systems Frontiers, 13(1), 101–113.CrossRefGoogle Scholar
  29. Lindelauf, R., Borm, P., & Hamers, H. (2009). The Influence of Secrecy on the Communication Structure of Covert Networks. Social Networks, 31(2), 126–137.CrossRefGoogle Scholar
  30. Long, B., Zhang, Z. M., Wu, X., & Yu, P. S. (2006) Spectral Clustering for Multi-Type Relational Data. In 23rd International Conference on Machine Learning, (pp. 585–592): ACM.Google Scholar
  31. Long, B., Zhang, Z. M., & Yu, P. S. (2007). A Probabilistic Framework for Relational Clustering. Paper presented at the Proceedings of The 13th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining, San Jose,Google Scholar
  32. Mannes, A., & Golbeck, J. (2005) Building a Terrorism Ontology. In ISWC Workshop on Ontology Patterns for the Semantic Web, Galway, Ireland, (Vol. 36).Google Scholar
  33. Maximilian, L. (2015). ELKI: Environment for Developing KDD-Applications Supported by Index-Structures http://elki.dbs.ifi.lmu.de/.
  34. Mei, J. P., & Chen, L. (2012). A Fuzzy Approach for Multitype Relational Data Clustering. IEEE Transactions on Fuzzy Systems, 20(2), 358–371. doi: 10.1109/tfuzz.2011.2174366.CrossRefGoogle Scholar
  35. Memon, N., Wiil, U. K., & Qureshi, A. R. (2009) Design and development of an early warning system to prevent terrorist attacks. In Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on, 2009 (pp. 222–226): IEEE.Google Scholar
  36. Morselli, C., Giguère, C., & Petit, K. (2007). The efficiency/security trade-off in criminal networks. Social Networks, 29(1), 143–153.CrossRefGoogle Scholar
  37. Nath, S. (2006). Crime Pattern Detection Using Data Mining. Paper presented at the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, Hong Kong, Dec. 2006.Google Scholar
  38. Nieves, S., & Cruz, A. (2011). Finding Patterns of Terrorist Groups in Iraq: A Knowledge Discovery Analysis. Paper presented at the Ninth LACCEI Latin American and Caribbean Conference (LACCEI’2011), Engineering for a Smart Planet, Innovation, Information Technology and Computational Tools for Sustainable Development., Medellín.Google Scholar
  39. Nizamani, S., & Memon, N. (2011). Evolution of Terrorist Network Using Clustered Approach: A Case Study. Paper presented at the European Intelligence and Security Informatics Conference (EISIC’11), 12–14 Sept. 2011Google Scholar
  40. Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, 13(1), 33–43.CrossRefGoogle Scholar
  41. Ozgul, F., Atzenbeck, C., & Erdem, Z. (2011). How Much Similar Are Terrorists Networks of Istanbul? In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Kaohsiung, 2011 (pp. 468–472). doi: 10.1109/asonam.2011.94.
  42. Pedahzur, A., & Perliger, A. (2006). The changing nature of suicide attacks: a social network perspective. Social forces, 84(4), 1987–2008.CrossRefGoogle Scholar
  43. Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. PS: Political Science & Politics, 44(01), 45–50.Google Scholar
  44. Popp, R., Armour, T., & Numrych, K. (2004). Countering terrorism through information technology. Communications of the ACM, 47(3), 36–43.CrossRefGoogle Scholar
  45. Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity. International Journal of Human-Computer Studies, 65(1), 71–84.Google Scholar
  46. Ressler, S. (2006). Social network analysis as an approach to combat terrorism: past, present, and future research. Homeland Security Affairs, 2(2), 1–10.Google Scholar
  47. Roberts, N., & Everton, S. F. (2011). Strategies for Combating Dark Networks. Journal of Social Structure, 12(2), 1–32.Google Scholar
  48. Salton, G., & Buckley, C. (1988). Term-Weighting Approaches in Automatic Text Retrieval. Inf. Process. Manage., 24(5), 513–523. doi: 10.1016/0306-4573(88)90021-0.CrossRefGoogle Scholar
  49. Shen, Z., Ma, K.-L., & Eliassi-Rad, T. (2006). Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction. IEEE Transactions on Visualization and Computer Graphics, 12(6), 1427–1439. doi: 10.1109/tvcg.2006.107.CrossRefGoogle Scholar
  50. Siebeneck, L. K., Medina, R. M., Yamada, I., & Hepner, G. F. (2009). Spatial and temporal analyses of terrorist incidents in Iraq. Studies in Conflict & Terrorism, 32(7), 591–610.CrossRefGoogle Scholar
  51. Sizov, S. (2010). GeoFolk: latent spatial semantics in web 2.0 social media. Paper presented at the Proceedings of the third ACM international conference on Web search and data mining, New York.Google Scholar
  52. Start (2012). Global Terrorism Database (GTD),National Consortium for the Study of Terrorism and Responses to Terrorism (START) http://www.start.umd.edu/gtd/about/2012.
  53. Symeonidis, P., Tiakas, E., & Manolopoulos, Y. (2011). Product recommendation and rating prediction based on multi-modal social networks. Paper presented at the Proceedings of the fifth ACM conference on Recommender systems, Chicago.Google Scholar
  54. Tang, L., & Liu, H. (2009) Relational learning via latent social dimensions. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, (pp. 817–826): ACM.Google Scholar
  55. Tang, L., Liu, H., Zhang, J., & Nazeri, Z. (2008) Community evolution in dynamic multi-mode networks. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (pp. 677–685): ACM.Google Scholar
  56. Tang, L., Wang, X., & Liu, H. (2009) Uncoverning Groups via Heterogeneous Interaction Analysis. In Ninth IEEE International Conference on Data Mining(ICDM’09) (pp. 503–512): IEEE.Google Scholar
  57. Tang, L., Wang, X., & Liu, H. (2012). Community Detection via Heterogeneous Interaction Analysis. Data Mining and Knowledge Discovery, 25(1), 1–33.CrossRefGoogle Scholar
  58. Wang, X., Sun, J., Chen, Z., & Zhai, C. (2006) Latent Semantic Analysis for Multiple-type Interrelated Data Objects. In Proceedings of The 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, (pp. 236–243). 1148214: Seattle:ACM. doi:10.1145/1148170.1148214.Google Scholar
  59. Wang, X., Tang, L., Gao, H., & Liu, H. (2010) Discovering Overlapping Groups in Social Media. In IEEE 10th International Conference on Data Mining (ICDM’10), (pp. 569–578): IEEE.Google Scholar
  60. Weinstein, C., Campbell, W., Delaney, B., & O’Leary, G. (2009) Modeling and Detection Techniques for Counter-Terror Social Network Analysis and Intent Recognition. In IEEE Aerospace Conference, (pp. 1–16): IEEE.Google Scholar
  61. Wiil, U. K., Memon, N., & Gniadek, J. (2011). Crimefighter: A Toolbox for Counterterrorism. In Joint International Conference on Knowledge Discovery, Knowlege Engineering and Knowledge Management (pp. 337–350). Portugal: Springer.CrossRefGoogle Scholar
  62. Wikipedia: Armenian Secret Army for the Liberation of Armenia. (n.d.) https://en.wikipedia.org/wiki/Armenian_Secret_Army_for_the_Liberation_of_Armenia.
  63. Wu, X., Ngo, C.-W., & Li, Q. (2005) Co-clustering of Time-evolving News Story with Transcript and Keyframe. In IEEE International Conference on Multimedia and Expo (ICME’05) (pp. 117–120): IEEE.Google Scholar
  64. Xi, W., Zhang, B., Chen, Z., Lu, Y., Yan, S., Ma, W.-Y., et al. (2004) Link Fusion: A Unified Link Analysis Framework for Multi-Type Interrelated Data Objects. In Proceedings of the 13th international conference on World Wide Web, (pp. 319–327): ACM.Google Scholar
  65. Xu, J., & Chen, H. (2008). The topology of dark networks. Communications of the ACM, 51(10), 58–65.CrossRefGoogle Scholar
  66. Xuan, D., Yu, H., & Wang, J. (2014). A Novel Method of Centrality in Terrorist Network. In Seventh International Symposium on Computational Intelligence and Design (ISCID’14) (Vol. 2, pp. 144–149): IEEE.Google Scholar
  67. Yang, C. (2008). Knowledge Discovery and Information Visualization for Terrorist Social Networks. In Intelligence and Security Informatics (pp. 45–64): Springer.Google Scholar
  68. Yang, C., & Sageman, M. (2009). Analysis of terrorist social networks with fractal views. Journal of Information Science, 35(3), 299–320. doi: 10.1177/0165551508099089.CrossRefGoogle Scholar
  69. Yang, C., Liu, N., & Sageman, M. (2006). Analyzing the Terrorist Social Networks with Visualization Tools. In Intelligence and Security Informatics (pp. 331–342): Springer.Google Scholar
  70. Ying, G., Da-you, L., Cheng-min, S., & He, L. A. (2008) Two-Stage Clustering Algorithm for Multi-type Relational Data. In Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD ‘08), 6–8 Aug. 2008 (pp. 376–380). doi: 10.1109/snpd.2008.26.
  71. Zeng, H. J., Zhang, B., Chen, Z., Ma, W. Y., Li, L., Li, Y., et al. (2010). Reinforced Clustering of Multi-Type Data Objects for Search Term Suggestion. Google Patents (U.S. Patent No. 7,689,585).Google Scholar
  72. Zhuang, H., Zhang, J., Brova, G., Tang, J., Cam, H., Yan, X., et al. (2014) Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks. In IEEE International Conference on Data Mining (ICDM), (pp. 1127–1132): IEEE.Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Information SystemsYarmouk UniversityIrbidJordan
  2. 2.Department of Information SystemsUniversity of Maryland, Baltimore County (UMBC)BaltimoreUSA

Personalised recommendations