Suicide Bomb Attack Identification and Analytics through Data Mining Techniques

Suicide bomb attacks are a high priority concern nowadays for every country in the world. They are a massively destructive criminal activity known as terrorism where one explodes a bomb attached to himself or herself, usually in a public place, taking the lives of many. Terrorist activity in different regions of the world depends and varies according to geopolitical situations and significant regional factors. There has been no significant work performed previously by utilizing the Pakistani suicide attack dataset and no data mining-based solutions have been given related to suicide attacks. This paper aims to contribute to the counterterrorism initiative for the safety of this world against suicide bomb attacks by extracting hidden patterns from suicidal bombing attack data. In order to analyze the psychology of suicide bombers and find a correlation between suicide attacks and the prediction of the next possible venue for terrorist activities, visualization analysis is performed and data mining techniques of classification, clustering and association rule mining are incorporated. For classification, Naïve Bayes, ID3 and J48 algorithms are applied on distinctive selected attributes. The results exhibited by classification show high accuracy against all three algorithms applied, i.e., 73.2%, 73.8% and 75.4%. We adapt the K-means algorithm to perform clustering and, consequently, the risk of blast intensity is identified in a particular location. Frequent patterns are also obtained through the Apriori algorithm for the association rule to extract the factors involved in suicide attacks.

[1]  L. S. Too,et al.  What Works in Community-Led Suicide Prevention: Perspectives of Wesley LifeForce Network Coordinators , 2021, International journal of environmental research and public health.

[2]  Muzammil Hussain,et al.  Real-Time DDoS Attack Detection System Using Big Data Approach , 2021, Sustainability.

[3]  Karthikeyan A Comparative Study of Data Mining Algorithms for Decision Tree Approaches using WEKA Tool , 2022 .

[4]  Mazhar Javed Awan,et al.  Social Media and Stock Market Prediction: A Big Data Approach , 2021 .

[5]  Amin Taheri-Garavand,et al.  Deep learning-based appearance features extraction for automated carp species identification , 2020 .

[6]  Bo Tao,et al.  Spatiotemporal Modeling for Nonlinear Distributed Thermal Processes Based on KL Decomposition, MLP and LSTM Network , 2020, IEEE Access.

[7]  J. M. Poland SUICIDE BOMBERS: A GLOBAL PROBLEM , 2016 .

[8]  Rachna Jain,et al.  AI-enabled COVID-9 Outbreak Analysis and Prediction: Indian States vs. Union Territories , 2021 .

[9]  Mazhar Javed Awan,et al.  Cricket Match Analytics Using the Big Data Approach , 2021, Electronics.

[10]  Mazhar Javed Awan,et al.  Detection of COVID-19 in Chest X-ray Images: A Big Data Enabled Deep Learning Approach , 2021, International journal of environmental research and public health.

[11]  C. Allen A Critical Analysis of Britain’s Living, Dead and Zombie Multiculturalism: From 7/7 to the London 2012 Olympic Games , 2014 .

[12]  Kwok-Wing Chau,et al.  A Survey of Deep Learning Techniques: Application in Wind and Solar Energy Resources , 2019, IEEE Access.

[13]  Karrar Hameed Abdulkareem,et al.  Efficient Detection of Knee Anterior Cruciate Ligament from Magnetic Resonance Imaging Using Deep Learning Approach , 2021, Diagnostics.

[14]  Alan S. Abrahams,et al.  Terrorism Information Extraction from Online Reports , 2015, J. Comput. Inf. Syst..

[15]  Yogesh Ghodasara,et al.  Using Apriori with WEKA for Frequent Pattern Mining , 2014, ArXiv.

[16]  Yousaf Saeed,et al.  Prediction of Future Terrorist Activities Using Deep Neural Networks , 2020, Complex..

[17]  Muhammad Shoaib Farooq,et al.  Detection of Schistosomiasis Factors Using Association Rule Mining , 2019, IEEE Access.

[18]  H. Park,et al.  With Friends Like These … Why Terrorist Organizations Ally , 2016 .

[19]  Shadi Diab,et al.  Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks , 2019, ArXiv.

[20]  Rytis Maskeliūnas,et al.  Real-Time Hand Gesture Recognition Based on Deep Learning YOLOv3 Model , 2021, Applied Sciences.

[21]  Mohammed Erritali,et al.  A comparative study of decision tree ID3 and C4.5 , 2014 .

[22]  S. Syed,et al.  Historical patterns of terrorism in Pakistan , 2014 .

[23]  H. Ursprung,et al.  Suicide attacks and religious cleavages , 2015, SSRN Electronic Journal.

[24]  Alva Mantari,et al.  Machine Learning Techniques to Visualize and Predict Terrorist Attacks Worldwide using the Global Terrorism Database , 2020, International Journal of Advanced Computer Science and Applications.

[25]  Tushar Gupta,et al.  Crime detection and criminal identification in India using data mining techniques , 2014, AI & SOCIETY.

[26]  Muhammad Sohail Anwar Malik,et al.  Identification of Risk Factors Generating Terrorism in Pakistan , 2015 .

[27]  Anthony Scime,et al.  Explaining religious terrorism: A data-mined analysis , 2015 .

[28]  Talha Mahboob Alam,et al.  Domain Analysis of Information Extraction Techniques , 2018 .

[29]  T. Kroll,et al.  Scoping Review: Suicide Specific Intervention Programmes for People Experiencing Homelessness , 2021, International journal of environmental research and public health.

[30]  Shweta Srivastava,et al.  Weka: A Tool for Data preprocessing, Classification, Ensemble, Clustering and Association Rule Mining , 2014 .

[31]  M. Khan,et al.  Exploring the phenomenon of suicidal behaviour (SB): An explanatory, mixed-method study in rural Pakistan , 2021, The International journal of social psychiatry.

[32]  Mohd Shafry Mohd Rahim,et al.  A Big Data Approach to Black Friday Sales , 2021 .

[33]  Ritu Sharma,et al.  K-Means Clustering in Spatial Data Mining using Weka Interface , 2012 .

[34]  Gha,et al.  COMPARISON AND EVALUATION OF INFORMATION RETRIEVAL MODELS , 2018 .

[35]  Syed Muhammad Anwar,et al.  A Recommendation Engine for Predicting Movie Ratings Using a Big Data Approach , 2021, Electronics.

[36]  Azlan Mohd Zain,et al.  Fake News Data Exploration and Analytics , 2021, Electronics.

[37]  Mazhar Javed Awan Acceleration of Knee MRI Cancellous bone Classification on Google Colaboratory using Convolutional Neural Network , 2019 .

[38]  M. Hussain,et al.  Osteoporosis Prediction for Trabecular Bone using Machine Learning: A Review , 2021 .

[39]  Mohammad T. Khasawneh,et al.  An Outlier-Based Intention Detection for Discovering Terrorist Strategies , 2017 .

[40]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.