Skip to main content

Which Centrality Metric for Which Terrorist Network Topology?

  • Conference paper
  • First Online:
Information Systems for Crisis Response and Management in Mediterranean Countries (ISCRAM-med 2016)

Abstract

Recently, an exponential growth in the use of social network analysis (SNA) tools has been witnessed. SNA offers quantitative measures known as centralities which allow the identification of important nodes in a given network. In fact, determining such nodes in terrorist networks is a way to destabilize these cells and prevent their criminal activities. Identifying key players is highly dependent on structural characteristics of nodes. Therefore, many approaches rely on centrality metrics to propose various disruption strategies. Indeed, knowledge of these measures helps in revealing vulnerabilities of terrorist networks and may have important implications for investigations. It is debatable how to choose the suitable centrality measure that helps effectively to destabilize the terrorist network. In this paper, we aim to answer this question. We first provide an analytical study where we identify 6 topologies of terrorist networks and discuss the appropriate metrics per topology. Secondly, we provide the performed experimental analysis on five data sets (with 5 different topologies) to prove our analytical conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Magalingam, P., Davis, S.: Ranking the importance level of intermediaries to a criminal using a reliance measure. arXiv preprint arXiv:1506.06221 (2016)

  2. Michalak, T.P., Rahwan, T., Skibski, O., Wooldridge, M.: Defeating terrorist networks with game theory. IEEE Intell. Syst. 1, 53–61 (2015)

    Article  Google Scholar 

  3. Michalak, T.P., Aadithya, K.V., Szczepanski, P.L., Ravindran, B., Jennings, N.R.: Efficient computation of the Shapley value for game-theoretic network centrality. J. Artif. Intell. Res. 46, 607–650 (2013)

    Google Scholar 

  4. Skibski, O., Michalak, T.P., Rahwan, T., Wooldridge, M.: Algorithms for the Shapley and Myerson values in graph-restricted games. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 197–204. International Foundation for Autonomous Agents and Multiagent Systems, May 2014

    Google Scholar 

  5. Xuan, D., Yu, H., Wang, J.: A novel method of centrality in terrorist network. In: Seventh International Symposium on Computational Intelligence and Design (ISCID), December 2014, vol. 2, pp. 144–149. IEEE (2014)

    Google Scholar 

  6. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

  7. Sparrow, M.K.: The application of network analysis to criminal intelligence: an assessment of the prospects. Soc. Netw. 13(3), 251–274 (1991)

    Article  Google Scholar 

  8. Berzinji, A., Kaati, L., Rezine, A.: Detecting key players in terrorist networks. In: 2012 European Intelligence and Security Informatics Conference (EISIC), pp. 297–302. IEEE, August 2012

    Google Scholar 

  9. Azad, S., Gupta, A.: A quantitative assessment on 26/11 Mumbai attack using social network analysis. J. Terrorism Res. 2(2), 1–10 (2011)

    Article  Google Scholar 

  10. Nasrullah, M., Larsen, H.L.: Structural analysis and mathematical methods for destabilizing terrorist networks. In: Proceedings of the International Conference on Advanced Data Mining Applications, pp. 1037–1048 (2006)

    Google Scholar 

  11. Fellman, P.V., Clemens, J.P., Wright, R., Post, J.V., Dadmun, M.: Disrupting terrorist networks: a dynamic fitness landscape approach. In: Minai, A.A., Braha, D., Bar-Yam, Y. (eds.) Conflict and Complexity, pp. 165–178. Springer, New York (2015)

    Google Scholar 

  12. Ozgul, F., Bowerman, C.: Characteristics of terrorists networks based on ideology and practices. In: 2014 European Network Intelligence Conference (ENIC), pp. 95–99. IEEE (2014)

    Google Scholar 

  13. Bonacich, P.: Factoring and weighting approaches to status scores and clique identification. J. Math. Soc. 2(1), 113–120 (1972)

    Article  Google Scholar 

  14. Karthika, S., Bose, S.: A comparative study of social networking approaches in identifying the covert nodes. Int. J. Web Serv. Comput. 2(3), 65 (2011)

    Article  Google Scholar 

  15. Hamed, I., Charrad, M.: Recognizing information spreaders in terrorist networks: 26/11 attack case study. In: Bellamine Ben Saoud, N., Adam, C., Hanachi, C. (eds.) ISCRAM-med 2015. LNBIP, vol. 233, pp. 27–38. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24399-3_3

    Google Scholar 

  16. Everett, M.G., Borgatti, S.P.: The centrality of groups and classes. J. Math. Sociol. 23(3), 181–201 (1999)

    Article  Google Scholar 

  17. http://rpackages.ianhowson.com/cran/keyplayer/

  18. http://news.psu.edu/story/264519/2013/02/18/research/international-center-study-terrorism-focuses-latest-research

  19. Everton, S.F.: Network topography, key players and terrorist networks (2009)

    Google Scholar 

  20. https://www.r-project.org/

  21. http://www.inf.fu-berlin.de/lehre/WS06/pmo/eng/audio/Chomsky.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imen Hamed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Hamed, I., Charrad, M., Ben Saoud, N.B. (2016). Which Centrality Metric for Which Terrorist Network Topology?. In: Díaz, P., Bellamine Ben Saoud, N., Dugdale, J., Hanachi, C. (eds) Information Systems for Crisis Response and Management in Mediterranean Countries. ISCRAM-med 2016. Lecture Notes in Business Information Processing, vol 265. Springer, Cham. https://doi.org/10.1007/978-3-319-47093-1_17

Download citation

Publish with us

Policies and ethics