DarkNetExplorer (DNE): Exploring dark multi-layer networks beyond the resolution limit

Abstract Timely identification of terrorist networks within civilian populations could assist security and intelligence personnel to disrupt and dismantle potential terrorist activities. Finding “small” and “good” communities in multi-layer terrorist networks, where each layer represents a particular type of relationship between network actors, is a vital step in such disruption efforts. We propose a community detection algorithm that draws on the principles of discrete-time random walks to find such “small” and “good” communities in a multi-layer terrorist network. Our algorithm uses several parallel walkers that take short independent random walks towards hubs on a multi-layer network to capture its structure. We first evaluate the correlation between nodes using the extracted walks. Then, we apply an agglomerative clustering procedure to maximize the asymptotical Surprise, which allows us to go beyond the resolution limit and find small and less sparse communities in multi-layer networks. This process affords us a focused investigation on the more important seeds over random actors within the network. We tested our algorithm on three real-world multi-layer dark networks and compared the results against those found by applying two existing approaches – Louvain and InfoMap – to the same networks. The comparative analysis shows that our algorithm outperforms the existing approaches in differentiating “small” and “good” communities.

[1]  Greg Wilson,et al.  Brokers and Key Players in the Internationalization of the FARC , 2013 .

[2]  Guimei Liu,et al.  Complex discovery from weighted PPI networks , 2009, Bioinform..

[3]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[4]  Sergio Gómez,et al.  Random walk centrality in interconnected multilayer networks , 2015, ArXiv.

[5]  Ryan Miller,et al.  Three is The Answer: Combining Relationships to Analyze Multilayered Terrorist Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[6]  S. Everton,et al.  Tracking, Destabilizing and Disrupting Dark Networks with Social Networks Analysis , 2008 .

[7]  Jeffrey Scott McIllwain,et al.  Organized crime: A social network approach , 1999 .

[8]  Ryan Miller,et al.  Discovering and Leveraging Communities in Dark Multi-Layered Networks for Network Disruption , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[9]  Uffe Kock Wiil,et al.  PEVNET: A framework for visualization of criminal networks , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[10]  Martin Rosvall,et al.  Maps of random walks on complex networks reveal community structure , 2007, Proceedings of the National Academy of Sciences.

[11]  David Robinson,et al.  The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract” , 2018, Security Informatics.

[12]  Mason A. Porter,et al.  A local perspective on community structure in multilayer networks , 2015, Network Science.

[13]  L. Freeman,et al.  Centrality in valued graphs: A measure of betweenness based on network flow , 1991 .

[14]  Srinivasan Parthasarathy,et al.  Local graph sparsification for scalable clustering , 2011, SIGMOD '11.

[15]  Ubon Thongsatapornwatana,et al.  A survey of data mining techniques for analyzing crime patterns , 2016, 2016 Second Asian Conference on Defence Technology (ACDT).

[16]  P.A.C. Duijn,et al.  Detecting and disrupting criminal networks , 2016 .

[17]  Tom Crick,et al.  Measuring UK crime gangs: a social network problem , 2015, Social Network Analysis and Mining.

[18]  Rafal Drezewski,et al.  The application of social network analysis algorithms in a system supporting money laundering detection , 2015, Inf. Sci..

[19]  Gilles Didier,et al.  Identifying communities from multiplex biological networks by randomized optimization of modularity , 2018, F1000Research.

[20]  Boleslaw K. Szymanski,et al.  Community Detection with Edge Augmentation in Criminal Networks , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[21]  Eri Prasetyo Wibowo,et al.  Network Disintegration in Criminal Network , 2015, 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).

[22]  Benjamin C. M. Fung,et al.  Wordnet-Based Criminal Networks Mining for Cybercrime Investigation , 2019, IEEE Access.

[23]  Gemma Edwards,et al.  Covert social movement networks and the secrecy-efficiency trade off: The case of the UK suffragettes (1906-1914) , 2012, Soc. Networks.

[24]  Federico Varese The Structure and the Content of Criminal Connections: The Russian Mafia in Italy , 2013 .

[25]  Stephen A. Davis,et al.  Using shortest path to discover criminal community , 2015, Digit. Investig..

[26]  Angelo Bifone,et al.  Community detection in weighted brain connectivity networks beyond the resolution limit , 2016, NeuroImage.

[27]  Martin Rosvall,et al.  Memory in network flows and its effects on spreading dynamics and community detection , 2013, Nature Communications.

[28]  Anders Lansner,et al.  Workshop report: 1st INCF Workshop on Large-scale Modeling of the Nervous System , 2007 .

[29]  David B. Skillicorn,et al.  Modeling dynamic social networks using spectral embedding , 2014, Social Network Analysis and Mining.

[30]  Meihong Wang,et al.  ACCDS: A Criminal Community Detection System Based on Evolving Social Graphs , 2018, ER Workshops.

[31]  Andrea Lancichinetti,et al.  Community detection algorithms: a comparative analysis: invited presentation, extended abstract , 2009, VALUETOOLS.

[32]  Vincent A. Traag,et al.  Detecting communities using asymptotical Surprise , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[33]  Daniel Neagu,et al.  Bipartite network model for inferring hidden ties in crime data , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[34]  Sean F. Everton,et al.  Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis , 2016 .

[35]  Steven J. Strang Network Analysis in Criminal Intelligence , 2014 .

[36]  David R. Schaefer,et al.  Youth co-offending networks: An investigation of social and spatial effects , 2011, Soc. Networks.

[37]  Boleslaw K. Szymanski,et al.  On community structure in complex networks: challenges and opportunities , 2019, Applied Network Science.

[38]  Benjamin C. M. Fung,et al.  Mining Criminal Networks from Chat Log , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[39]  Pasquale De Meo,et al.  Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..

[40]  Ignacio Marín,et al.  SurpriseMe: an integrated tool for network community structure characterization using Surprise maximization , 2013, Bioinform..

[41]  Mansi Ghodsi,et al.  A review of data mining applications in crime , 2016, Stat. Anal. Data Min..

[42]  Patrick M. Dudas Cooperative, dynamic Twitter parsing and visualization for dark network analysis , 2013, 2013 IEEE 2nd Network Science Workshop (NSW).

[43]  Ju Xiang,et al.  Identifying multi-scale communities in networks by asymptotic surprise , 2018, Journal of Statistical Mechanics: Theory and Experiment.

[44]  Hsinchun Chen,et al.  Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..

[45]  Catherine S. Greenhill,et al.  Criminal network vulnerabilities and adaptations , 2017 .

[46]  Daniel Dajun Zeng,et al.  User community discovery from multi-relational networks , 2013, Decis. Support Syst..

[47]  Fatih Özgül,et al.  Comparison of Feature-Based Criminal Network Detection Models with k-Core and n-Clique , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[48]  Josep García-Blandón,et al.  Money laundering through the strategic management of accounting transactions , 2019, Critical Perspectives on Accounting.

[49]  Emilio Ferrara,et al.  Forensic analysis of phone call networks , 2012, Social Network Analysis and Mining.

[50]  Damon McCoy,et al.  Constructing and Analyzing Criminal Networks , 2014, 2014 IEEE Security and Privacy Workshops.

[51]  Matthieu Latapy,et al.  Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..

[52]  Kathy J. Horadam,et al.  Analysis of two crime-related networks derived from bipartite social networks , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[53]  Zhangxi Lin,et al.  A framework for exploring organizational structure in dynamic social networks , 2011, Decis. Support Syst..

[54]  Stéphane Bressan,et al.  Fast Community Detection , 2013, DEXA.

[55]  Toyotaro Suzumura,et al.  Finding overlapping communities in multilayer networks , 2018, PloS one.

[56]  Katherine Faust,et al.  Social Networks and Crime: Pitfalls and Promises for Advancing the Field , 2019, Annual Review of Criminology.

[57]  M. Emiliani,et al.  Terrorism in Indonesia: Noordin's Networks , 2009 .

[58]  Giovanni Montana,et al.  Community detection in multiplex networks using Locally Adaptive Random walks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[59]  Shamaila Qayyum,et al.  A Survey of Data Mining Techniques for Crime Detection , 2018 .

[60]  S. Fortunato,et al.  Resolution limit in community detection , 2006, Proceedings of the National Academy of Sciences.

[61]  Alexandre Arenas,et al.  Identifying modular flows on multilayer networks reveals highly overlapping organization in social systems , 2014, ArXiv.

[62]  Hsinchun Chen,et al.  COPLINK: managing law enforcement data and knowledge , 2003, CACM.

[63]  Guangquan Xu,et al.  Community detection for multi-layer social network based on local random walk , 2018, J. Vis. Commun. Image Represent..

[64]  Fredy Troncoso,et al.  A novel approach to detect associations in criminal networks , 2020, Decis. Support Syst..

[65]  Wenke Lee,et al.  Connected Colors: Unveiling the Structure of Criminal Networks , 2013, RAID.

[66]  Javier Del Ser,et al.  Community detection in graphs based on surprise maximization using firefly heuristics , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[67]  Vincent A. Traag,et al.  Significant Scales in Community Structure , 2013, Scientific Reports.

[68]  Sean F. Everton,et al.  Monitoring and Disrupting Dark Networks: A Bias Toward the Center and What It Costs Us , 2016 .

[69]  Jitendra Agarwal,et al.  Community Detection in Action: Identification of Critical Elements in Infrastructure Networks , 2018 .

[70]  Paulo Shakarian,et al.  Illuminating Dark Networks: Criminal Social Network Intelligence Analysis with the GANG Software , 2015 .

[71]  Robin Sibson,et al.  SLINK: An Optimally Efficient Algorithm for the Single-Link Cluster Method , 1973, Comput. J..

[72]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[73]  Dino Ienco,et al.  Local community detection in multilayer networks , 2017, Data Mining and Knowledge Discovery.

[74]  Carlo Morselli,et al.  “Legitimate Strengths in Criminal Networks” , 2006 .

[75]  Bisharat Rasool Memon Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures , 2012, 2012 European Intelligence and Security Informatics Conference.

[76]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[77]  Houkuan Huang,et al.  A Community-Based Pseudolikelihood Approach for Relationship Labeling in Social Networks , 2011, ECML/PKDD.

[78]  Xiaoyi Gao,et al.  Human population structure detection via multilocus genotype clustering , 2007, BMC Genetics.

[79]  Boleslaw K. Szymanski,et al.  Supplemental Methods For: Identifying Robust Communities and Multi-community Nodes by Combining Top-down and Bottom-up Approaches to Clustering , 2022 .

[80]  C. Hughes,et al.  Poly-drug trafficking: Estimating the scale, trends and harms at the Australian border. , 2016, The International journal on drug policy.

[81]  Steven Skiena,et al.  DeepWalk: online learning of social representations , 2014, KDD.

[82]  Scott D Warnke Partial Information Community Detection in a Multilayer Network , 2016 .

[83]  Chiara Broccatelli Going beyond secrecy : methodological advances for two-mode temporal criminal networks with Social Network Analysis , 2017 .

[84]  Masashi Furukawa,et al.  A Method for Accelerating the HITS Algorithm , 2010, J. Adv. Comput. Intell. Intell. Informatics.

[85]  Carlo Piccardi,et al.  Uncovering the Structure of Criminal Organizations by Community Analysis: The Infinito Network , 2014, 2014 Tenth International Conference on Signal-Image Technology and Internet-Based Systems.

[86]  S. Chuprat,et al.  Discovering criminal networks by Web structure mining , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[87]  Carlo Morselli,et al.  Inside Criminal Networks , 2008 .

[88]  Sean F. Everton Disrupting Dark Networks: The Noordin Top Terrorist Network , 2012 .

[89]  Xiuzhen Zhang,et al.  Behavioral Analysis of Users for Spammer Detection in a Multiplex Social Network , 2018, AusDM.

[90]  Mohammed J. Zaki,et al.  Is There a Best Quality Metric for Graph Clusters? , 2011, ECML/PKDD.

[91]  Yubo Yuan,et al.  Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[92]  Rich Gazan,et al.  Detecting sex trafficking circuits in the U.S. through analysis of online escort advertisements , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[93]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[94]  B. Erickson Secret Societies and Social Structure , 1981 .

[95]  Noga Alon,et al.  Many random walks are faster than one , 2007, SPAA '08.

[96]  Aili Malm,et al.  Drug supply networks: a systematic review of the organizational structure of illicit drug trade , 2017 .