Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks

We study a recently developed centrality metric to identify key players in terrorist organisations due to Lindelauf et al. [2013]. This metric, which involves computation of the Shapley value for connectivity games on graphs proposed by Amer and Gimenez [2004], was shown to produce substantially better results than previously used standard centralities. In this paper, we present the first computational analysis of this class of coalitional games, and propose two algorithms for computing Lindelauf et al.'s centrality metric. Our first algorithm is exact, and runs in time linear by number of connected subgraphs in the network. As shown in the numerical simulations, our algorithm identifies key players in the WTC 9/11 terrorist network, constructed of 36 members and 125 links, in less than 40 minutes. In contrast, a general-purpose Shapley value algorithm would require weeks to solve this problem. Our second algorithm is approximate and can be used to study much larger networks.

[1]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[2]  Herbert Hamers,et al.  The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.

[3]  Peter Borm,et al.  Characterizations of the β- and the Degree Network Power Measure , 2008 .

[4]  Ely Porat,et al.  Power and stability in connectivity games , 2008, AAMAS.

[5]  Talal Rahwan,et al.  A new approach to betweenness centrality based on the Shapley Value , 2012, AAMAS.

[6]  Jonathan David Farley,et al.  Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .

[7]  Guillermo Owen,et al.  Centrality and power in social networks: a game theoretic approach , 2003, Math. Soc. Sci..

[8]  L. Shapley,et al.  Values of Large Games, I , 1977 .

[9]  Herbert Hamers,et al.  On Heterogeneous Covert Networks , 2008 .

[10]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[11]  Guido Moerkotte,et al.  Analysis of two existing and one new dynamic programming algorithm for the generation of optimal bushy join trees without cross products , 2006, VLDB.

[12]  Toshihide Ibaraki,et al.  Complexity of the Minimum Base Game on Matroids , 1997, Math. Oper. Res..

[13]  Sarvapali D. Ramchurn,et al.  On coalition formation with sparse synergies , 2012, AAMAS.

[14]  P. Flajolet On approximate counting , 1982 .

[15]  Ulrik Brandes,et al.  Network Analysis: Methodological Foundations (Lecture Notes in Computer Science) , 2005 .

[16]  Herbert Hamers,et al.  Leaderless Covert Networks: A Quantitative Approach , 2012 .

[17]  Rafael Amer,et al.  A connectivity game for graphs , 2004, Math. Methods Oper. Res..

[18]  Peter C. Fishburn,et al.  Theory and decision , 2003 .

[19]  Muhammad H. Alsuwaiyel,et al.  Algorithms - Design Techniques and Analysis , 1999, Lecture Notes Series on Computing.

[20]  Daniel Gómez,et al.  Polynomial calculation of the Shapley value based on sampling , 2009, Comput. Oper. Res..

[21]  Xiaotie Deng,et al.  On the Complexity of Cooperative Solution Concepts , 1994, Math. Oper. Res..

[22]  Nicholas R. Jennings,et al.  A randomized method for the shapley value for the voting game , 2007, AAMAS '07.

[23]  Noah E. Friedkin,et al.  Theoretical Foundations for Centrality Measures , 1991, American Journal of Sociology.

[24]  Herbert Hamers,et al.  Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..

[25]  Jens Vygen,et al.  The Book Review Column1 , 2020, SIGACT News.

[26]  L. Shapley,et al.  VALUES OF LARGE GAMES. 6: EVALUATING THE ELECTORAL COLLEGE EXACTLY , 1962 .

[27]  Michael Wooldridge,et al.  Computational Aspects of Cooperative Game Theory , 2011, KES-AMSTA.

[28]  L. S. Shapley,et al.  17. A Value for n-Person Games , 1953 .

[29]  Nicholas R. Jennings,et al.  Efficient Computation of the Shapley Value for Centrality in Networks , 2010, WINE.

[30]  Roland Bacher,et al.  Determinants of matrices related to the Pascal triangle , 2002 .

[31]  Ulrik Brandes,et al.  Network Analysis: Methodological Foundations , 2010 .

[32]  Rahul Savani,et al.  Power Indices in Spanning Connectivity Games , 2009, AAIM.

[33]  Evangelos Markakis,et al.  Approximating power indices , 2008, AAMAS.

[34]  G. Owen,et al.  A game theoretic approach to measuring degree of centrality in social networks , 1982 .

[35]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[36]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[37]  Michael Wooldridge,et al.  Computational Aspects of Cooperative Game Theory (Synthesis Lectures on Artificial Inetlligence and Machine Learning) , 2011 .

[38]  Kathleen M. Carley,et al.  Destabilizing Terrorist Networks , 1998 .