Skip to main content

Advertisement

Log in

Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The backbone of the semantic web is ontology, dealing with the context of details associated with a specific domain. Domain ontology (DO) is an important source of information for knowledge-based systems. Nonetheless, developing DO is a time-consuming procedure that is heavily reliant on the developer's expertise. Here, a novel semi-automated technique for creating Ontologies in the terrorism domain is suggested. Terrorism actions provide critical information that can be used to improve a country's security system. To obtain the most up-to-date knowledge of the domain, online social network (OSN) data, specifically Twitter text data, is retrieved, and then concepts and associated relationships are recognized and mapped through formal concept analysis (FCA). The fluent editor tool (FET) displays a number of user-defined associations. Knowledge is also extracted using a query-based approach and a reasoner window in the FET. The created DO is broadcast on the web using an ontology web language (OWL) that may be used in a variety of other applications. The suggested work is notable because it creates broad-coverage DO for the terrorist domain using a tool called Fluent Editor (FE) instead of the typical tool (protégé), and semantic information is retrieved with 100% correctness, similar to a query-based search system (QBS).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Tucker R, O’Brien DT, Ciomek A, Castro E, Wang Q, Phillips NE (2021) Who ‘Tweets’ where and when, and how does it help understand crime rates at places? Measuring the presence of tourists and commuters in ambient populations. J Quant Criminol 37(2):333–359

    Article  Google Scholar 

  2. Bendaoud R, Hacene AMR, Toussaint Y, Delecroix B, Napoli A (2007) Text-based ontology construction using relational concept analysis. In: International workshop on ontology dynamics-IWOD 2007

  3. Inyaem U, Meesad P, Haruechaiyasak C (2009) Named-entity techniques for terrorism event extraction and classification. In: 2009 eighth international symposium on natural language processing. IEEE, pp 175–179

  4. Suhendra A, Winadwiastuti J, Darmayantie A, Farida N (2017) Terrorism domain corpus building using latent Dirichlet allocation (LDA) and its ontology relationship building using global similarity hierarchy learning (GSHL). In: 2017 11th international conference on information and communication technology and system (ICTS). IEEE, pp 253–258

  5. Konys A (2018) Towards knowledge handling in ontology-based information extraction systems. Procedia Comput Sci 126:2208–2218

    Article  Google Scholar 

  6. Jain S (2021) Semantics-based decision support for unconventional emergencies. Understanding semantics-based decision support. Chapman and Hall/CRC, London, pp 57–66

    Chapter  Google Scholar 

  7. Rawat R, Mahor V, Garg B, Telang S, Pachlasiya K, Kumar A et al (2022) Analyzing newspaper articles for text-related data for finding vulnerable posts over the internet that are linked to terrorist activities. Int J Inf Secur Priv 16(1):1–14

  8. Patel A, Sharma A, Jain S (2020) An intelligent resource manager over terrorism knowledge base. Recent Adv Comput Sci Commun 13(3):394–405

    Article  Google Scholar 

  9. Jindal R, Seeja KR, Jain S (2020) Construction of domain ontology utilizing formal concept analysis and social media analytics. Int J Cogn Comput Eng 1:62–69

    Google Scholar 

  10. Weichbroth P (2019) Fluent editor and controlled natural language in ontology development. Int J Artif Intell Tools 28(04):1940007

    Article  Google Scholar 

  11. Aghdam MH, Zanjani MD (2021) A novel regularized asymmetric non-negative matrix factorization for text clustering. Inf Process Manag 58(6):102694

    Article  Google Scholar 

  12. Rawat R, Mahor V, Chirgaiya S, Shaw RN, Ghosh A (2021) Analysis of darknet traffic for criminal activities detection using TF-IDF and light gradient boosted machine learning algorithm. Innovations in electrical and electronic engineering. Springer, Singapore, pp 671–681

    Chapter  Google Scholar 

  13. Mehri R, Haarslev V, Chinaei H (2021) A machine learning approach for optimizing heuristic decision-making in web ontology language reasoners. Comput Intell 37(1):273–314

    Article  MathSciNet  Google Scholar 

  14. Rajawat AS, Rawat R, Shaw RN, Ghosh A (2021) Cyber physical system fraud analysis by mobile robot. Machine learning for robotics applications. Springer, Singapore, pp 47–61

    Chapter  Google Scholar 

  15. Kakad S, Dhage S (2021) Ontology construction from cross domain customer reviews using expectation maximization and semantic similarity. In: 2021 international conference on emerging smart computing and informatics (ESCI). IEEE, pp 19–23

  16. Inyaem U, Meesad P, Haruechaiyasak C, Tran D (2010) Construction of fuzzy ontology-based terrorism event extraction. In: 2010 third international conference on knowledge discovery and data mining. IEEE, pp 391–394

  17. Rawat R, Garg B, Mahor V, Telang S, Pachlasiya K, Chouhan M. Organ trafficking on the dark web—the data security and privacy concern in healthcare systems. Internet of Healthcare Things, 191

  18. Rožanec JM, Zajec P, Kenda K, Novalija I, Fortuna B, Mladenić D (2021) XAI-KG: knowledge graph to support XAI and decision-making in manufacturing. In: International conference on advanced information systems engineering. Springer, Cham, pp 167–172

  19. Rajawat AS, Rawat R, Barhanpurkar K, Shaw RN, Ghosh A (2021) Vulnerability analysis at industrial internet of things platform on dark web network using computational intelligence. In: Computationally intelligent systems and their applications, pp 39–51

  20. Slowinski R, Vanderpooten D (2000) A generalized definition of rough approximations based on similarity. IEEE Trans Knowl Data Eng 12(2):331–336

    Article  Google Scholar 

  21. Rajawat AS, Rawat R, Mahor V, Shaw RN, Ghosh A (2021) Suspicious big text data analysis for prediction—on darkweb user activity using computational intelligence model. Innovations in electrical and electronic engineering. Springer, Singapore, pp 735–751

    Chapter  Google Scholar 

  22. Sikos LF (2021) AI in digital forensics: ontology engineering for cybercrime investigations. Wiley Interdiscipl Rev Forensic Sci 3(3):e1394

    Article  Google Scholar 

  23. Rawat R, Mahor V, Rawat A, Garg B, Telang S (2021) Digital transformation of cyber crime for chip-enabled hacking. Handbook of research on advancing cybersecurity for digital transformation. IGI Global, Hershey, pp 227–243

    Chapter  Google Scholar 

  24. Nehinbe JO (2021) Statistical methods for conducting the ontology and classifications of fake news on social media. Handbook of research on cyber crime and information privacy. IGI Global, Hershey, pp 632–651

    Google Scholar 

  25. Rawat R, Mahor V, Chirgaiya S, Shaw RN, Ghosh A (2021) Sentiment analysis at online social network for cyber-malicious post reviews using machine learning techniques. Comput Intell Syst Appl 113–130

  26. Liebetrau T, Christensen KK (2021) The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces. Eur J Int Secur 6(1):25–43

    Article  Google Scholar 

  27. Rawat R, Garg B, Pachlasiya K, Mahor V, Telang S, Chouhan M et al (2022) SCNTA: monitoring of network availability and activity for identification of anomalies using machine learning approaches. Int J Inf Technol Web Eng 17(1):1–19

  28. Sandagiri C, Kumara BT, Kuhaneswaran B (2021) Deep neural network-based crime prediction using Twitter data. Int J Syst Serv-Oriented Eng (IJSSOE) 11(1):15–30

    Article  Google Scholar 

  29. Karmakar S, Das S (2021) Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation. In: Proceedings of the 54th Hawaii international conference on system sciences

  30. Koufakis A, Chatzakou D, Meditskos G, Tsikrika T, Vrochidis S, Kompatsiaris I (2020) Invited keynote on IOT4SAFE 2020: semantic web technologies in fighting crime and terrorism: The CONNEXIONs approach. In: IOT4SAFE@ ESWC

  31. Mannes A, Golbeck J (2007) Ontology building: a terrorism specialist's perspective. In: 2007 IEEE aerospace conference. IEEE, pp 1–5

  32. Tsikrika T, Andreadou K, Moumtzidou A, Schinas E, Papadopoulos S, Vrochidis S, Kompatsiaris I (2015) A unified model for socially interconnected multimedia-enriched objects. In: International conference on multimedia modeling. Springer, Cham, pp 372–384

  33. Galjano P, Popovich V (2009) Theoretical investigation of terrorism. Ontology development. Information fusion and geographic information systems. Springer, Berlin, pp 227–239

    Chapter  Google Scholar 

  34. Inyaem U, Meesad P, Haruechaiyasak C, Tran D (2009) Ontology-based terrorism event extraction. In: 2009 first international conference on information science and engineering. IEEE, pp 912–915

  35. Rawat R, Rajawat AS, Mahor V, Shaw RN, Ghosh A (2021) Dark Web—onion hidden service discovery and crawling for profiling morphing, unstructured crime and vulnerabilities prediction. Innovations in electrical and electronic engineering. Springer, Singapore, pp 717–734

    Chapter  Google Scholar 

  36. Sikos LF (2015) Semantic web development tools. Mastering structured data on the semantic web. Apress, Berkeley, pp 79–119

    Chapter  Google Scholar 

  37. Rawat R, Mahor V, Chirgaiya S, Rathore AS (2021) Applications of social network analysis to managing the investigation of suspicious activities in social media platforms. In: Advances in cybersecurity management. Springer, Cham, pp 315–335

  38. Gennari JH, Musen MA, Fergerson RW, Grosso WE, Crubézy M, Eriksson H, Tu SW et al (2003) The evolution of Protégé: an environment for knowledge-based systems development. Int J Hum Comput Stud 58(1):89–123

    Article  Google Scholar 

Download references

Funding

The author does not receive any financial support for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Romil Rawat.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rawat, R. Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation. Int. j. inf. tecnol. 15, 893–903 (2023). https://doi.org/10.1007/s41870-022-00934-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-00934-9

Keywords

Navigation