Skip to main content

Analyzing Various Social Networking Approaches for Covert Networks

  • Conference paper
Trends in Network and Communications (WeST 2011, NeCoM 2011, WiMoN 2011)

Abstract

The world we live in is a complex socio-technical system and systematically thinking about, representing, modeling and analyzing these systems has been made possible by social network analysis approach. A lot of groups or communities do exist in the society but the terrorist network has been taken for study in this paper because they consist of networks of individuals that span countries, continents, the economic status, and form around specific ideology. In this paper we present a survey to study the terrorist network using the criminal network analysis which is based on dynamic network analysis, destabilizing covert networks, counter terrorism, key player, subgroup detection and criminal network analysis in homeland security. This paper will also discuss various open problems in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xu, J.J., Chen, H.: CrimeNet Explorer: A framework for criminal network knowledge discovery. ACM Transactions on Information Systems 23(2), 201–226 (2005)

    Article  Google Scholar 

  2. Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homeland Security Affairs II(2) (July 2006)

    Google Scholar 

  3. Chen, H., Chung, W., Xu, J.J., Qin, G.W.Y., Chau, M.: Crime Data Mining: A general framework and some examples. IEEE Computer Society 37(4), 50–56 (2004)

    Article  Google Scholar 

  4. Memon, N., Larsen, H.L.: Practical approaches for analysis, visualization and destabilizing terrorist networks. Presented at First International Conference on Availability, Reliability and Security (2006)

    Google Scholar 

  5. Schroeder, J., Chen, H., Xu, J., Chau, M.: Automated criminal link analysis based on domain knowledge. Journal of the American Society for Information Science and Technology 58(6), 842–855 (2007)

    Article  Google Scholar 

  6. Duval, R.D., Christenseny, K., Spahiuz, A.: Bootstrapping a terrorist network. Presented in the Conference of Southern Illinois University Carbondale (2010)

    Google Scholar 

  7. Yang, C.C., Ng, T.D.: Terrorism and crime related weblog social network: link, content analysis and information visualization. Presented in IEEE International Conference on Intelligence and Security Informatics, New Brunswick, NJ (2007)

    Google Scholar 

  8. Xu, J.J., Chen, H.: Using shortest path algorithms to identify criminal associations. Decision Support Systems 38, 473–487 (2004)

    Article  Google Scholar 

  9. Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. AI and Law (in press)

    Google Scholar 

  10. Maeno, Y., Ohsawa, Y.: Analyzing covert social network foundation behind terrorism disaster. Int. J. Services Sciences 2(2) (2007)

    Google Scholar 

  11. Maeno, Y.: Node discovery problem for a social network. Connections 29, 62–76 (2009)

    Google Scholar 

  12. Dombroski, M., Carley, K.M.: NETEST: Estimating a terrorist network’s structure. Computational & Mathematical Organization Theory 8, 235–241 (2002)

    Article  Google Scholar 

  13. Hutchins, C.E., Benham-Hutchins, M.: Hiding in plain sight: criminal network analysis. Computational & Mathematical Organization Theory 16(1), 89–111 (2009)

    Article  Google Scholar 

  14. Dombroski, M., Fischbeck, P., Carley, K.: Estimating the shape of covert networks. Presented in the Proceedings of 8th International Command and Control Research and Technology Symposium, Washington, DC (June 2003)

    Google Scholar 

  15. Appavu, S., Rajaram, R., Muthupandian, M., Athiappan, G., Kashmeera, K.S.: Data mining based on intelligent analysis of threatening e-mail. Knowledge-Based Systems 22, 392–393 (2009)

    Article  Google Scholar 

  16. Carley, K.M.: A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action. In: Visualizing Network Information. Meeting Proceedings RTO-MP-IST-063. Neuilly-sur-Seine, France: RTO, pp. KN1-1 – KN1-10 (2006)

    Google Scholar 

  17. McCulloh, I.A., Carley, K.M.: Social network change detection. Carnegie Mellon University, School of Computer Science, Technical Report, CMU-CS-08-116

    Google Scholar 

  18. Carley, K.M.: Estimating vulnerabilities in large covert networks. Presented in the Proceedings of 9th International Command and Control Research and Technology Symposium held at Loews Corornado Resort, CA. Evidence Based Research, Vienna, VA (2004)

    Google Scholar 

  19. Borgatti, S.: The key player problem. Presented in the Proceedings of the National Academy of Sciences Workshop on Terrorism. National Academy of Sciences, Washington DC (2002)

    Google Scholar 

  20. Lin, S.-d., Chalupsky, H.: Discovering and explaining abnormal nodes in semantic graphs. IEEE Transactions on Knowledge and Data Engineering 20(8), 1039–1052 (2008)

    Article  Google Scholar 

  21. Memon, N., Harkiolakis, N., Hicks, D.L.: Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study. In: The Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, pp. 206–215 (2008)

    Google Scholar 

  22. Memon, N., Qureshi, A.R., Wiil, U.K., Hicks, D.L.: Novel algorithms for subgroup detection in terrorist networks. Presented in the International Conference on Availability, Reliability and Security, Fukuoka Institute of Technology, Fukuoka, Japan (2009)

    Google Scholar 

  23. Elovici, Y., Shapira, B., Last, M., Zaafrany, O., Friedman, M., Schneider, M., Kandel, A.: Detection of access to terror-related web sites using an Advanced Terror Detection System (ATDS). Journal of the American Society for Information Science and Technology 61(2), 405–418 (2010)

    Google Scholar 

  24. Basu, A.: Social network analysis of terrorist organizations in India. Paper Presented at the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, Notre Dame, Indiana, pp. 26–28 (2005)

    Google Scholar 

  25. Saxena, S., Santhanam, K., Basu, A.: Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic Analysis 28(1) (2004)

    Google Scholar 

  26. Wiil, U.K., Memon, N., Gniadek, J.: Knowledge management processes, tools and techniques for counterterrorism. Presented in the International Conference on Knowledge Management and Information Sharing, pp. 29–36 (2009)

    Google Scholar 

  27. Weinstein, C., Campbell, W., Delaney, B., O’Leary, J.: Modeling and detection techniques for counter-terror social network analysis and intent recognition. Presented in the Proceedings of the IEEE Aerospace Conference (2009)

    Google Scholar 

  28. Yang, C.C., Liu, N., Sageman, M.: Analyzing the terrorist social networks with visualization tools. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 331–342. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  29. Goolsby, R.: Combating terrorist networks: An evolutionary approach. Presented in the Proceedings of the 8th International Command and Control Research and Technology Symposium held at National Defense War College Washington DC, Evidence Based Research Vienna VA (2003)

    Google Scholar 

  30. Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., Weimann, G.: Uncovering the dark web: A case study of Jihad on the web. Journal of the American Society for Information Science and Technology 59(8), 1347–1359 (2008)

    Article  Google Scholar 

  31. Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43–52 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karthika, S., Bose, S. (2011). Analyzing Various Social Networking Approaches for Covert Networks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22543-7_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22542-0

  • Online ISBN: 978-3-642-22543-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics