Similarity Analysis of Criminals on Social Networks: An Example on Twitter

Terrorist Networks (TNs) and Organized Crime (OC) are nowadays an increasing threat in the modern society. Due to the strong adoption of the IT technology, an emergent phenomenon is represented by the exploitation of social media, such as Twitter, Facebook, YouTube to disseminate and promote illegal activities, recruit terrorists and establish collaborations. The traditional approaches and countermeasures against cyber-crimes result inadequate in the cyber-space. In this context, the paper proposes an engineering method, centered on three main phases, to support the analysis of suspicious users on social media related to OC and TNs. It is based on the exploitation and extension of social network analysis approaches combined with well-known clustering techniques and association rules. It aims to identify similarities as well as groups of users associated to specific illegal activities such as drugs, weapons and human trafficking. Moreover, it supports the identification process of leaders in groups and mediators between them. A software, which enables the automatic execution of the proposed method, is developed and experimented on the Twitter social media. The results show both the identification of groups of users related to OC and TNs along with their intra-group activities as well as inter-group relationships through potential mediators.

[1]  Dong Wang,et al.  Discovering Similar Users on Twitter , 2013 .

[2]  Enghin Omer,et al.  Using machine learning to identify jihadist messages on Twitter , 2015 .

[3]  Online Sex Slaves: The Internet's Powerful Role in Sex Trafficking , 2016 .

[4]  Philip S. Yu,et al.  Scalable Link-Based Similarity Computation and Clustering , 2010, Link Mining.

[5]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[6]  Mina Razghandi,et al.  A Context-Aware and User Behavior-Based Recommender System with Regarding Social Network Analysis , 2017, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).

[7]  Mohammad T. Khasawneh,et al.  New framework that uses patterns and relations to understand terrorist behaviors , 2017, Expert Syst. Appl..

[8]  Christopher M. Gifford,et al.  Fuzzy association rule mining for community crime pattern discovery , 2010, ISI-KDD '10.

[9]  J. Klausen Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq , 2015 .

[10]  Uuf Brajawidagda,et al.  Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks , 2015, DG.O.

[11]  Pankaj Choudhary,et al.  A Survey on Social Network Analysis for Counter- Terrorism , 2015 .

[12]  Max Mühlhäuser,et al.  A multi-language approach towards the identification of suspicious users on social networks , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).

[13]  Nasrullah Memon,et al.  Practical Algorithms for Destabilizing Terrorist Networks , 2006, ISI.

[14]  Iwao Fujino,et al.  Finding Similar Tweets and Similar Users by Applying Document Similarity to Twitter Streaming Data , 2013 .

[15]  Divya Bansal,et al.  Execution of APRIORI Algorithm of Data Mining Directed Towards Tumultuous Crimes Concerning Women , 2013 .

[16]  R. Rajasree,et al.  Sentiment analysis in twitter using machine learning techniques , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[17]  Lay-Ki Soon,et al.  Natural Language Processing for Sentiment Analysis: An Exploratory Analysis on Tweets , 2014, 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology.

[18]  Virender Ranga,et al.  Sentiment analysis of the Uri terror attack using Twitter , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[19]  Eliane Tschaen Barbieri,et al.  The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign , 2012 .

[20]  D. Masciandaro Global Financial Crime : Terrorism, Money Laundering and Offshore Centres , 2017 .

[21]  George Karypis,et al.  Item-based top-N recommendation algorithms , 2004, TOIS.

[22]  Shyam Varan Nath,et al.  Crime Pattern Detection Using Data Mining , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[23]  Junghoo Cho,et al.  Topical semantics of twitter links , 2011, WSDM '11.

[24]  Divya Bansal,et al.  Usage of Apriori Algorithm of Data Mining as an Application to Grievous Crimes against Women , 2013 .

[25]  R. Bates Dancing With Wolves: Today's Lone Wolf Terrorists , 2012 .

[26]  Damon McCoy,et al.  Constructing and Analyzing Criminal Networks , 2014, 2014 IEEE Security and Privacy Workshops.

[27]  Neha Mahyavanshi,et al.  A Novel Idea for Credit Card Fraud Detection using Decision Tree , 2017 .

[28]  Matthew S. Gerber,et al.  Predicting crime using Twitter and kernel density estimation , 2014, Decis. Support Syst..

[29]  Boleslaw K. Szymanski,et al.  Overlapping community detection in networks: The state-of-the-art and comparative study , 2011, CSUR.

[30]  Kristin M. Finklea,et al.  Organized Crime: An Evolving Challenge for U.S. Law Enforcement , 2010 .

[31]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[32]  P. Bonacich Factoring and weighting approaches to status scores and clique identification , 1972 .

[33]  Sreela Sasi,et al.  Sentiment Analysis of ISIS Related Tweets Using Absolute Location , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[34]  A. Malathi,et al.  Algorithmic Crime Prediction Model Based on the Analysis of Crime Clusters , 2011 .

[35]  Yiannis Kompatsiaris,et al.  Detection of Terrorism-related Twitter Communities using Centrality Scores , 2017, MFSec@ICMR.

[36]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[37]  Barbara Carminati,et al.  User similarities on social networks , 2013, Social Network Analysis and Mining.

[38]  Tong Wang,et al.  Detecting Patterns of Crime with Series Finder , 2013, AAAI.

[39]  John David Elijah Sandig,et al.  Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis , .

[40]  Yagnik Ankur,et al.  Oulier Analysis Using Frequent Pattern Mining – A Review , 2013 .

[41]  Jennifer Widom,et al.  SimRank: a measure of structural-context similarity , 2002, KDD.

[42]  Revatthy Krishnamurthy,et al.  Survey of Data Mining Techniques on Crime Data Analysis , 2012 .

[43]  G. A. Ali Identifying Terrorist Affiliations through Social Network Analysis: Using Data Mining Techniques , 2016 .

[44]  Ioannis Anagnostopoulos,et al.  Discovering similar Twitter accounts using semantics , 2015, Eng. Appl. Artif. Intell..

[45]  Mohammad Shamsul Arefin,et al.  Developing a framework for analyzing social networks to identify human behaviours , 2016, 2016 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE).

[46]  Matthew Michelson,et al.  Tweet Disambiguate Entities Retrieve Folksonomy SubTree Step 1 : Discover Categories Generate Topic Profile from SubTrees Step 2 : Discover Profile Topic Profile : “ English Football ” “ World Cup ” , 2010 .

[47]  L. Freeman,et al.  Centrality in valued graphs: A measure of betweenness based on network flow , 1991 .

[48]  Max Mühlhäuser,et al.  Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).

[49]  M. Conway Introduction: terrorism and contemporary mediascapes – reanimating research on media and terrorism , 2012 .