Exploring the Current Trends and Future Prospects in Terrorist Network Mining

In today’s era of hi-tech technologies, criminals are easily fulfilling their inhuman goals against the mankind. Thus, the security of civilians has significantly become important. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed using data mining techniques. One such technique is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways for identifying terrorist activities.

[1]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[2]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[3]  A. K. Pujari,et al.  Data Mining Techniques , 2006 .

[4]  Rayford B. Vaughn,et al.  An improved algorithm for fuzzy data mining for intrusion detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).

[5]  Limsoon Wong,et al.  DATA MINING TECHNIQUES , 2003 .

[6]  Wang Jiaxin,et al.  Investigative Data Mining: Identifying Key Nodes in Terrorist Networks , 2006, 2006 IEEE International Multitopic Conference.

[7]  Nasrullah Memon,et al.  Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[8]  Jiawei Han,et al.  Data Mining: Concepts and Techniques, Second Edition , 2006, The Morgan Kaufmann series in data management systems.

[9]  Jian Pei,et al.  Data Mining: Concepts and Techniques, 3rd edition , 2006 .

[10]  M. J. Hosseinpour,et al.  Notice of Violation of IEEE Publication Principles Detecting Terror-Related Activities on the Web with Using Data Mining Techniques , 2009 .

[11]  Shingo Mabu,et al.  An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[12]  Philip Vos Fellman,et al.  Modeling Terrorist Networks, Complex Systems at the Mid-range , 2014, ArXiv.

[13]  Daniel T. Larose,et al.  Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .