Approaches to analyze cyber terrorist communities: Survey and challenges

Cyber terrorism has become a major threat to world peace and global economic prosperity. The exponential growth of cyber terrorist communities has given rise to the need for the development of effective approaches, techniques, and tools to gain in-depth understanding of the ecosystem of these communities (specifically, in terms of inner structure, working strategies, and operation tactics). In the literature, numerous research works on the detection and analysis of cyber terrorist communities have been conducted. More notably, Social Networks Analysis (SNA) has emerged to be a key research field that attempts to analyze such cyber terrorist communities. In this paper, we survey, study, and classify the main approaches related to the analysis of cyber terrorist communities. We also discuss their characteristics, strengths and limitations. The approaches have been categorized into two main categories, namely, SNA based approaches and hybrid approaches. Furthermore, we identify areas that entail further research works with the aim of devising and developing more effective approaches that aid in analyzing cyber terrorist communities.

[1]  Mustafa Emirbayer,et al.  Network Analysis, Culture, and the Problem of Agency , 1994, American Journal of Sociology.

[2]  Douglas H. Harris,et al.  The Application of Link Analysis to Police Intelligence , 1975 .

[3]  Phipps Arabie,et al.  Constructing blockmodels: How and why , 1978 .

[4]  David Knoke,et al.  Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism , 2015 .

[5]  Richard M. Medina,et al.  Social Network Analysis: A case study of the Islamist terrorist network , 2012, Security Journal.

[6]  Hsinchun Chen,et al.  CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.

[7]  Fionn Murtagh,et al.  A Survey of Recent Advances in Hierarchical Clustering Algorithms , 1983, Comput. J..

[8]  Ronald S. Burt,et al.  Network items and the general social survey , 1984 .

[9]  Cliff Goddard,et al.  Semantic Analysis: A Practical Introduction , 1998 .

[10]  James E. Yonamine,et al.  A nuanced study of political conflict using the Global Datasets of Events Location and Tone (GDELT) dataset , 2013 .

[11]  Didier Dubois,et al.  A Brief Overview of Possibilistic Logic , 1991, ECSQARU.

[12]  Michael I. Jordan,et al.  Supervised learning from incomplete data via an EM approach , 1993, NIPS.

[13]  Stephen J. Ressler Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .

[14]  P. Bonacich Factoring and weighting approaches to status scores and clique identification , 1972 .

[15]  H. White,et al.  “Structural Equivalence of Individuals in Social Networks” , 2022, The SAGE Encyclopedia of Research Design.

[16]  Kerri Morgan,et al.  Certificates of Factorisation for a Class of Triangle-Free Graphs , 2009, Electron. J. Comb..

[17]  Lotfi A. Zadeh,et al.  Toward a generalized theory of uncertainty (GTU)--an outline , 2005, Inf. Sci..

[18]  Lillian Lee,et al.  Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..

[19]  Gary LaFree,et al.  Introducing the Global Terrorism Database , 2007 .

[20]  Alex Bavelas,et al.  Communication Patterns in Task‐Oriented Groups , 1950 .

[21]  S. Karthika,et al.  Analyzing Various Social Networking Approaches for Covert Networks , 2011 .

[22]  Hsinchun Chen,et al.  A concept space approach to addressing the vocabulary problem in scientific information retrieval: an experiment on the worm community system , 1997 .

[23]  Uffe Kock Wiil,et al.  CrimeFighter Assistant - A Knowledge Management Tool for Terrorist Network Analysis , 2010, KMIS.

[24]  Christian Borgelt,et al.  Possibilistic Graphical Models , 2000, Computational Intelligence in Data Mining.

[25]  Nancy Roberts,et al.  Strategies for Combating Dark Networks , 2011, J. Soc. Struct..

[26]  J. Nieminen On the centrality in a graph. , 1974, Scandinavian journal of psychology.

[27]  Sean F. Everton Network Topography, Key Players and Terrorist Networks , 2009 .

[28]  Sam Mullins,et al.  An exploratory, dynamic application of Social Network Analysis for modelling the development of Islamist terror‐cells in the West , 2010 .

[29]  Jaideep Srivastava,et al.  Incremental page rank computation on evolving graphs , 2005, WWW '05.

[30]  Joseph A. Gallian,et al.  A Dynamic Survey of Graph Labeling , 2009, The Electronic Journal of Combinatorics.

[31]  Ellen M. Voorhees,et al.  Implementing agglomerative hierarchic clustering algorithms for use in document retrieval , 1986, Inf. Process. Manag..

[32]  Gerra Gilberto,et al.  Dr. Gilberto Gerra, Chief of Drug Prevention and Health Branch, Division for Operations, United Nations Office on Drugs and Crime (UNODC), Vienna. , 2013 .

[33]  Nasrullah Memon,et al.  Analyzing news summaries for identification of terrorism incident type , 2014 .

[34]  Bernhard Rieder,et al.  Studying Facebook via data extraction: the Netvizz application , 2013, WebSci.

[35]  Damon McCoy,et al.  Constructing and Analyzing Criminal Networks , 2014, 2014 IEEE Security and Privacy Workshops.

[36]  Hsinchun Chen,et al.  Criminal network analysis and visualization , 2005, CACM.

[37]  S. Koschade A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .

[38]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[39]  John Scott What is social network analysis , 2010 .

[40]  Shouyang Wang,et al.  Network analysis of terrorist activities , 2014, J. Syst. Sci. Complex..

[41]  Nasrullah Memon,et al.  Practical Algorithms for Destabilizing Terrorist Networks , 2006, ISI.

[42]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[43]  Sean F. Everton,et al.  Detecting significant changes in dark networks , 2013 .

[44]  Ted E. Senator,et al.  Restructuring Databases for Knowledge Discovery by Consolidation and Link Formation , 1995, KDD.

[45]  Eliane Tschaen Barbieri,et al.  The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign , 2012 .

[46]  Nisha Chaurasia,et al.  A Survey on Terrorist Network Mining: Current Trends and Opportunities , 2012 .

[47]  Pankaj Choudhary,et al.  A Survey on Social Network Analysis for Counter- Terrorism , 2015 .

[48]  Nir Friedman,et al.  Bayesian Network Classifiers , 1997, Machine Learning.

[49]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[50]  Thomas Hofmann,et al.  Unsupervised Learning by Probabilistic Latent Semantic Analysis , 2004, Machine Learning.

[51]  Garth Davies,et al.  Discovering bin-Laden’s Replacement in al-Qaeda, using Social Network Analysis: A Methodological Investigation , 2014 .

[52]  P. Klerks The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .