Analyzing Various Social Networking Approaches for Covert Networks

The world we live in is a complex socio-technical system and systematically thinking about, representing, modeling and analyzing these systems has been made possible by social network analysis approach. A lot of groups or communities do exist in the society but the terrorist network has been taken for study in this paper because they consist of networks of individuals that span countries, continents, the economic status, and form around specific ideology. In this paper we present a survey to study the terrorist network using the criminal network analysis which is based on dynamic network analysis, destabilizing covert networks, counter terrorism, key player, subgroup detection and criminal network analysis in homeland security. This paper will also discuss various open problems in this area.

[1]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[2]  Kathleen M. Carley,et al.  NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference , 2002, Comput. Math. Organ. Theory.

[3]  Hsinchun Chen,et al.  Using Shortest Path Algorithms to Identify Criminal Associations , 2002, DG.O.

[4]  S. Borgatti The Key Player Problem , 2002 .

[5]  Kathleen M. Carley,et al.  NETEST: Estimating a Terrorist Network's Structure , 2002 .

[6]  Paul S. Fischbeck,et al.  Estimating the Shape of Covert Networks , 2003 .

[7]  Aparna Basu,et al.  Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir , 2004 .

[8]  Hsinchun Chen,et al.  Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..

[9]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[10]  Kathleen M. Carley Estimating Vulnerabilities in Large Covert Networks , 2004 .

[11]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[12]  Nasrullah Memon,et al.  Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[13]  Christopher C. Yang,et al.  Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.

[14]  Rebecca Goolsby,et al.  Combating terrorist networks: An evolutionary approach , 2006, Comput. Math. Organ. Theory.

[15]  Kathleen M. Carley A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .

[16]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[17]  Yukio Ohsawa,et al.  Analyzing covert social network foundation behind terrorism disaster , 2007, ArXiv.

[18]  Yukio Ohsawa,et al.  Node discovery problem for a social network , 2007, ArXiv.

[19]  Hsinchun Chen,et al.  Automated criminal link analysis based on domain knowledge , 2007, J. Assoc. Inf. Sci. Technol..

[20]  Tobun Dorbin Ng,et al.  Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization , 2007, 2007 IEEE Intelligence and Security Informatics.

[21]  Hsinchun Chen,et al.  Uncovering the dark Web: A case study of Jihad on the Web , 2008 .

[22]  Shou-De Lin,et al.  Discovering and Explaining Abnormal Nodes in Semantic Graphs , 2008, IEEE Transactions on Knowledge and Data Engineering.

[23]  Kathleen M. Carley,et al.  Social Network Change Detection , 2008 .

[24]  David L. Hicks,et al.  Notice of Violation of IEEE Publication PrinciplesDetecting high-value individuals in covert networks: 7/7 London bombing case study , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[25]  Brian Delaney,et al.  Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition , 2009, 2009 IEEE Aerospace conference.

[26]  Uffe Kock Wiil,et al.  Knowledge Management Processes, Tools and Techniques for Counterterrorism , 2009, KMIS.

[27]  N. Memon,et al.  Notice of Violation of IEEE Publication PrinciplesNovel Algorithms for Subgroup Detection in Terrorist Networks , 2009, 2009 International Conference on Availability, Reliability and Security.

[28]  S. Appavu alias Balamurugan,et al.  Data mining based intelligent analysis of threatening e-mail , 2009, Knowl. Based Syst..

[29]  Arian Spahiu,et al.  Bootstrapping a Terrorist Network , 2010 .

[30]  Christopher E. Hutchins,et al.  Hiding in plain sight: criminal network analysis , 2010, Comput. Math. Organ. Theory.

[31]  Tossapon Boongoen,et al.  Disclosing false identity through hybrid link analysis , 2010, Artificial Intelligence and Law.

[32]  Abraham Kandel,et al.  Detection of access to terror-related Web sites using an Advanced Terror Detection System (ATDS) , 2010 .