Adaptable Reduced-Complexity Approach Based on State Vector Machine for Identification of Criminal Activists on Social Media

Security agencies face an emerging challenge of identifying and counter the malicious contents spread on the social media by the terrorists. However, text classification techniques are limited by visualization, pre-processing, features extraction, and larger features space. Additionally, change in criminal content require the learning models to identify altered malicious textual contents which poses extra challenge. This study proposes simplified yet adaptable framework that uses a novel features extraction algorithm for extracting features from the textual part of social media contents. The feature extraction considers selective features from only 8 dimensions and follows a six step process. The extracted features are suitably used to train the state vector machine for the classification of the malicious content. The performance of the proposed method is evaluated against other popular feature selection/extraction algorithms like term frequency-inverse document frequency, Gini Index (GI), Chi square statistics, and PCA. Additionally, machine learning classifiers like decision tree, random forest, and Naïve Bayes are also used for classification. Results suggest that the proposed approach consumes less energy on text visualization, pre-processing, and dimensionality reduction. It also reduces the time-space complexity of the features extraction process and is capable to steer according to the changing strategies of the active criminal groups. In addition, it can effectively analyze the propaganda material published by the extremists. It automatically identifies the radical text on social media platforms allowing understanding of the behaviors, characteristics and subsequent blockage of such content.

[1]  Yunpeng Xiao,et al.  Rumor Diffusion Model Based on Representation Learning and Anti-Rumor , 2020, IEEE Transactions on Network and Service Management.

[2]  R T Adek,et al.  Systematics Review on the Application of Social Media Analytics for Detecting Radical and Extremist Group , 2021 .

[3]  Muhammad Abulaish,et al.  A social graph based text mining framework for chat log investigation , 2014, Digit. Investig..

[4]  A. Pentland,et al.  Computational Social Science , 2009, Science.

[5]  M. Williams,et al.  Hate in the Machine: Anti-Black and Anti-Muslim Social Media Posts as Predictors of Offline Racially and Religiously Aggravated Crime , 2019, The British Journal of Criminology.

[6]  Qian Li,et al.  Rumor propagation dynamic model based on evolutionary game and anti-rumor , 2018, Nonlinear Dynamics.

[7]  Chad A. Steed,et al.  Matisse: A visual analytics system for exploring emotion trends in social media text streams , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[8]  Cécile Paris,et al.  Exploring Emotions in Social Media , 2015, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).

[9]  Parsa Ghaffari,et al.  Opinion Mining and Sentiment Polarity on Twitter and Correlation between Events and Sentiment , 2016, 2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService).

[10]  Khaleel Malik,et al.  Analyzing Sentiments Expressed on Twitter by UK Energy Company Consumers , 2018, 2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS).

[11]  Stuart Macdonald,et al.  Regulating terrorist content on social media: automation and the rule of law , 2019, International Journal of Law in Context.

[12]  Social Media Analytics Driven Counterterrorism Tool to improve Intelligence Gathering towards Combating Terrorism in Nigeria , 2017 .

[13]  Eun Yi Kim,et al.  Identifying depressive users in Twitter using multimodal analysis , 2016, 2016 International Conference on Big Data and Smart Computing (BigComp).

[14]  Xiang Wang,et al.  Short Text Classification Using Wikipedia Concept Based Document Representation , 2013, 2013 International Conference on Information Technology and Applications.

[15]  Efstathios Stamatatos,et al.  Authorship Attribution for Social Media Forensics , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Jalal Shah,et al.  Sentiment analysis of extremism in social media from textual information , 2020, Telematics Informatics.

[17]  Taha Yasseri,et al.  Detecting weak and strong Islamophobic hate speech on social media , 2018, Journal of Information Technology & Politics.

[18]  Foram P. Shah,et al.  A review on feature selection and feature extraction for text classification , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[19]  Erdogan Dogdu,et al.  Identifying trolls and determining terror awareness level in social networks using a scalable framework , 2016, 2016 IEEE International Conference on Big Data (Big Data).

[20]  Zhou Yao,et al.  Research on the Construction and Filter Method of Stop-word List in Text Preprocessing , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[21]  Michael Goldsmith,et al.  Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter , 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI).

[22]  Mirna Adriani,et al.  A two-stage emotion detection on Indonesian tweets , 2015, 2015 International Conference on Advanced Computer Science and Information Systems (ICACSIS).

[23]  Hong-wei Zhang,et al.  An improved text feature selection method based on key words , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[24]  Marouane Birjali,et al.  A comprehensive survey on sentiment analysis: Approaches, challenges and trends , 2021, Knowl. Based Syst..

[25]  Vikas S. Chavan,et al.  Machine learning approach for detection of cyber-aggressive comments by peers on social media network , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[26]  Balkishan,et al.  Detection of threatening user accounts on Twitter social media database , 2019, Int. J. Intell. Eng. Informatics.

[27]  Yudi Fernando,et al.  Terrorism, Social Media and Text Mining Technique: Review of Six Years Past Studies , 2020, 2020 International Conference on Information Management and Technology (ICIMTech).

[28]  Adam Michael Edwards,et al.  Detecting tension in online communities with computational Twitter analysis , 2015 .

[29]  Yanbing Liu,et al.  A Rumor & Anti-Rumor Propagation Model Based on Data Enhancement and Evolutionary Game , 2020, IEEE Transactions on Emerging Topics in Computing.

[30]  M. Khosravinik,et al.  Social media and terrorism discourse: the Islamic State’s (IS) social media discursive content and practices , 2020, Critical Discourse Studies.

[31]  Pete Burnap,et al.  Social media forensics applied to assessment of post-critical incident social reaction: The case of the 2017 Manchester Arena terrorist attack. , 2020, Forensic science international.

[32]  Jason J. Jung,et al.  Social big data: Recent achievements and new challenges , 2015, Information Fusion.