Multimode co-clustering for analyzing terrorist networks

The phenomenon of terrorism is deemed one of the fundamental challenges in national security. Creating defensive technologies to mitigate terrorist attacks requires a simultaneous investigation of contextual relationships among their various dimensions. We proposed and evaluated a graph-based methodology to analyze terrorist networks through co-clustering in a multimode basis. Since there are many heterogeneous relationships in terrorist networks depending on the dimensions used during analysis, we utilized the clustering indicators of the multimode structure discovered in bi- and multimode graphs. Objects and activities that co-occur during terrorist attacks are identified by applying conventional clustering on those indicators. The novelty of our method is in the incremental creation of the multimode structure using its bi-mode counterparts. Our approach is evaluated using these measures: clustering stability and association confidence. The experimental results yields encouraging results in terms of simultaneous clustering of heterogeneous objects in terrorist networks.

[1]  Panagiotis Symeonidis,et al.  Product recommendation and rating prediction based on multi-modal social networks , 2011, RecSys '11.

[2]  Christopher C. Yang,et al.  Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.

[3]  Chunju Tseng,et al.  Incorporating Geographical Contacts into Social Network Analysis for Contact Tracing in Epidemiology: A Study on Taiwan SARS Data , 2007, BioSurveillance.

[4]  Ted E. Senator,et al.  Countering terrorism through information technology , 2004, CACM.

[5]  Huan Liu,et al.  Community detection via heterogeneous interaction analysis , 2012, Data Mining and Knowledge Discovery.

[6]  Peter J. Carrington,et al.  Crime and Social Network Analysis , 2014 .

[7]  Herbert Hamers,et al.  The Influence of Secrecy on the Communication Structure of Covert Networks , 2008, Soc. Networks.

[8]  William Ribarsky,et al.  Visual analysis of entity relationships in the Global Terrorism Database , 2008, SPIE Defense + Commercial Sensing.

[9]  Zheng Chen,et al.  Latent semantic analysis for multiple-type interrelated data objects , 2006, SIGIR.

[10]  Carlo Morselli,et al.  The Efficiency/Security Trade-Off in Criminal Networks , 2007, Soc. Networks.

[11]  Pasquale De Meo,et al.  Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..

[12]  Václav Snásel,et al.  Visual investigation of similarities in Global Terrorism Database by means of synthetic social networks , 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN).

[13]  Huan Liu,et al.  Uncoverning Groups via Heterogeneous Interaction Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[14]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[15]  Nancy Roberts,et al.  Strategies for Combating Dark Networks , 2011, J. Soc. Struct..

[16]  Pontus Svenson,et al.  The HiTS/ISAC Social Network Analysis Tool , 2012, 2012 European Intelligence and Security Informatics Conference.

[17]  Jian-Ping Mei,et al.  A Fuzzy Approach for Multitype Relational Data Clustering , 2012, IEEE Transactions on Fuzzy Systems.

[18]  Abdul Rasool Qureshi,et al.  Design and development of an early warning system to prevent terrorist attacks , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[19]  Tina Eliassi-Rad,et al.  Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction , 2006 .

[20]  Huan Liu,et al.  Identifying Evolving Groups in Dynamic Multimode Networks , 2012, IEEE Transactions on Knowledge and Data Engineering.

[21]  Lise Getoor,et al.  Relational clustering for multi-type entity resolution , 2005, MRDM '05.

[22]  Hsinchun Chen,et al.  Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity , 2007, Int. J. Hum. Comput. Stud..

[23]  Christopher C. Yang Knowledge Discovery and Information Visualization for Terrorist Social Networks , 2008, Intelligence and Security Informatics.

[24]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[25]  Adam Blake,et al.  TOURISM CRISIS MANAGEMENT: US Response to September 11 , 2003 .

[26]  George A. Barnett,et al.  An examination of the relationship between international telecommunication networks, terrorism and global news coverage , 2013, Social Network Analysis and Mining.

[27]  Christopher C. Yang,et al.  Analysis of terrorist social networks with fractal views , 2009, J. Inf. Sci..

[28]  Jiawei Han,et al.  Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks , 2014, 2014 IEEE International Conference on Data Mining.

[29]  Shyam Varan Nath,et al.  Crime Pattern Detection Using Data Mining , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[30]  Huan Liu,et al.  Relational learning via latent social dimensions , 2009, KDD.

[31]  Philip S. Yu,et al.  Spectral clustering for multi-type relational data , 2006, ICML.

[32]  Uffe Kock Wiil,et al.  CrimeFighter: A Toolbox for Counterterrorism , 2009, IC3K.

[33]  Cécile Favre,et al.  Information diffusion in online social networks: a survey , 2013, SGMD.

[34]  Chong-Wah Ngo,et al.  Co-Clustering of Time-Evolving News Story with Transcript and Keyframe , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[35]  Fatih Özgül,et al.  How Much Similar Are Terrorists Networks of Istanbul? , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[36]  Philip S. Yu,et al.  A probabilistic framework for relational clustering , 2007, KDD '07.

[37]  Aparna Basu Social Network Analysis: A Methodology for Studying Terrorism , 2014 .

[38]  Ying Gao,et al.  A Two-Stage Clustering Algorithm for Multi-type Relational Data , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[39]  Niklas Elmqvist,et al.  Visual Analytics for Multimodal Social Network Analysis: A Design Study with Social Scientists , 2013, IEEE Transactions on Visualization and Computer Graphics.

[40]  Juyun Wang,et al.  A Novel Method of Centrality in Terrorist Network , 2014, 2014 Seventh International Symposium on Computational Intelligence and Design.

[41]  Hsinchun Chen,et al.  Identity matching using personal and social identity features , 2011, Inf. Syst. Frontiers.

[42]  Yun Chi,et al.  On evolutionary spectral clustering , 2009, TKDD.

[43]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[44]  Le Gruenwald,et al.  Using an ontology to improve search in a terrorism database system , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[45]  Sergej Sizov,et al.  GeoFolk: latent spatial semantics in web 2.0 social media , 2010, WSDM '10.

[46]  Inderjit S. Dhillon,et al.  Co-clustering documents and words using bipartite spectral graph partitioning , 2001, KDD '01.

[47]  Feiping Nie,et al.  Nonnegative Matrix Tri-factorization Based High-Order Co-clustering and Its Fast Implementation , 2011, 2011 IEEE 11th International Conference on Data Mining.

[48]  Hongjun Lu,et al.  ReCoM: reinforcement clustering of multi-type interrelated data objects , 2003, SIGIR.

[49]  A. Perliger,et al.  Social Network Analysis in the Study of Terrorism and Political Violence , 2011, PS: Political Science & Politics.

[50]  A. Perliger,et al.  The Changing Nature of Suicide Attacks - A Social Network Perspective , 2006, Social Forces.

[51]  Huan Liu,et al.  Discovering Overlapping Groups in Social Media , 2010, 2010 IEEE International Conference on Data Mining.

[52]  Marc Cheong,et al.  A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter , 2011, Inf. Syst. Frontiers.

[53]  Philip Vos Fellman,et al.  Modeling Terrorist Networks: The Second Decade , 2015 .

[54]  Brian Delaney,et al.  Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition , 2009, 2009 IEEE Aerospace conference.

[55]  A. Hoffman,et al.  Lower bounds for the partitioning of graphs , 1973 .

[56]  Edward A. Fox,et al.  Link fusion: a unified link analysis framework for multi-type interrelated data objects , 2004, WWW '04.

[57]  Veda C. Storey,et al.  Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..

[58]  Huan Liu,et al.  Community evolution in dynamic multi-mode networks , 2008, KDD.

[59]  Laura K. Siebeneck,et al.  Spatial and Temporal Analyses of Terrorist Incidents in Iraq, 2004–2006 , 2009 .

[60]  Paulo Cesar G. da Costa,et al.  Modeling a probabilistic ontology for Maritime Domain Awareness , 2011, 14th International Conference on Information Fusion.

[61]  H. Raghav Rao,et al.  Information control and terrorism: Tracking the Mumbai terrorist attack through twitter , 2011, Inf. Syst. Frontiers.

[62]  Nasrullah Memon,et al.  Evolution of Terrorist Network Using Clustered Approach: A Case Study , 2011, 2011 European Intelligence and Security Informatics Conference.

[63]  Jian Xu,et al.  Fuzzy clustering and iterative relational classification for terrorist profiling , 2008, 2008 IEEE International Conference on Granular Computing.

[64]  D.M. Mount,et al.  An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..