On the Use of Brokerage Approach to Discover Influencing Nodes in Terrorist Networks

Part of the Intelligent Systems Reference Library book series (ISRL, volume 65)

Abstract

Social Network Analysis is a non-conventional Data Mining technique which analyzes social networks on web. The technique is used frequently for studying network behaviors using centrality measures viz. Degree, Betweenness, Closeness and Eigenvector. Hence has also led to the concept of Terrorist Network Mining which aims at detection of the terrorist group, studying the hierarchy they follow for the communication (using SNA) and then finally destabilizing of the network activities. The chapter focuses on an approach under SNA known as Brokerage which finds brokers who serve as the leading nodes in the network. Brokerage is expected to be beneficial in case of estimating the terrorist groups where different subgroups of terrorist organization coordinate to fulfill their awful deeds. The brokerage on whole estimates the influential roles as it would be done by individually calculating the centrality measures, with much more useful information aiding to amend terrorist network analysis.

Keywords

Centrality Data Mining Graph Theory Social Network Analysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Krebs, V.E.: Uncloacking Terrorist Networks. First Monday 7, 4–1 (2002)Google Scholar
  2. 2.
    Borgatti, S.P., Everett, M.G., Freeman, L.C.: UCINET 6 for Windows, Analytic Technologies. Harvard University Press, Cambridge (2002)Google Scholar
  3. 3.
    Fellman, P.V., Wright, R.: Modeling Terrorist Networks - Complex Systems at the Mid-Range. In: Proceedings of Complexity, Ethics and Creativity Conference, LSE (2003)Google Scholar
  4. 4.
    Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O.: Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. Proceedings of Journal of Information Warfare (2004)Google Scholar
  5. 5.
    Tube, V.G.: Measuring the Social Capital of Brokerage Roles, Connections. International Network for Social Network Analysis 36(1), 29–52 (2004)Google Scholar
  6. 6.
    Memon, N., Qureshi, A.R.: Investigative Data Mining and its Application inCounterterrorism. In: Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications, Malta, pp. 97–403 (2005)Google Scholar
  7. 7.
    Burt, R.S.: Brokerage and Closure: An Introduction to Social Capital. Oxford University Press (2005)Google Scholar
  8. 8.
    de Nooy, W., Mrvar, A., Batagelj, V.: Exploratory Social Network Analysis with Pajek. Cambridge University Press, New York (2005) ISBN: 0521841739Google Scholar
  9. 9.
    Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers (2006)Google Scholar
  10. 10.
    Memon, N., Larsen, H.L.: Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. In: Proceedings of the First International Conference on Availability, Reliability and Security, ARES (2006)Google Scholar
  11. 11.
    Memon, N., Larsen, H.L.: Practical Algorithms And Mathematical Models For Destabilizing Terrorist Networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 389–400. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Memon, N., Larsen, H.L.: Structural Analysis and Destabilizing Terrorist Networks. In: The First International Conference on Availability, Reliability and Security, ARES 2006. IEEE (2006)Google Scholar
  13. 13.
    Shaikh, M.A., Jiaxin, W.: Investigative Data Mining: Identifying Key Nodes in Terrorist Networks. In: Multitopic Conference, INMIC 2006, pp. 201–207. IEEE (2007)Google Scholar
  14. 14.
    Memon, N., Kristoffersen, K.C., Hicks, D.L., Larsen, H.L.: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. In: Second International Conference on Availability, Reliability and Security (ARES 2007). IEEE (2007)Google Scholar
  15. 15.
    Memon, N., Larsen, H.L., Hicks, D., Harkiolakis, N.: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 477–489. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  16. 16.
    Memon, N., Qureshi, A.R., Will, U.K., Hicks, D.L.: Novel Algorithms for Subgroup Detection in Terrorist Networks. In: 2009 International Conference on Availability, Reliability and Security. IEEE (2009)Google Scholar
  17. 17.
    Bellotti, E.: Brokerage roles between cliques: a secondary clique analysis. Methodological Innovations Online 4, 53–73 (2009)Google Scholar
  18. 18.
    Wiil, U.K., Memon, N., Karampelas, P.: Detecting New Trends in Terrorist Networks. In: 2010 International Conference on Advances in Social Networks Analysis and Mining (2010)Google Scholar
  19. 19.
    Sozen, H.C., Sagsan, M.: The Brokerage Roles in the Organizational Networks and Manipulation of Information Flow. International Journal of eBusiness and eGovernment Studies 2(2) (2010) ISSN: 2146-0744Google Scholar
  20. 20.
    Azad, S., Gupta, A.: A Quantitative Assessment on 26/11 Mumbai Attack using Social Network Analysis. Journal of Terrorism Research (2011)Google Scholar
  21. 21.
    Kang, U., Papadimitriou, S., Sun, J., Tong, H.: Centralities in Large Networks: Algorithms and Observations. In: SIAM International Conference on Data Mining (SDM 2011), Phoenix, U.S.A. (2011)Google Scholar
  22. 22.
    Chaurasia, N., Dhakar, M., Tiwari, A., Gupta, R.K.: A Survey on Terrorist Network Mining: Current Trends and Opportunities? International Journal of Computer Science and Engineering Survey (IJCSES) 3(4), 59–66 (2012)CrossRefGoogle Scholar
  23. 23.
    Abraham, A., Hassanien, A.-E.: Computational Social Networks: Tools, Perspectives and Applications, 4th edn. Series in Computer Communications and Networks. Springer, London (2012) ISBN 978-1-4471-4047-4Google Scholar
  24. 24.
    Abraham, A.: Computational Social Networks: Security and Privacy, 4th edn. Series in Computer Communications and Networks. Springer, London (2012) ISBN 978-1-4471-4047-4Google Scholar
  25. 25.
    Abraham, A.: Computational Social Networks: Mining and Visualization, Series in Computer Communications and Networks. Springer, London (2012) ISBN 978-1-4471- 4047-4Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of CSE & ITMITS GwaliorGwaliorIndia

Personalised recommendations