Covert network analysis to detect key players using correlation and social network analysis

Ejaz Farooq, S. Khan, Wasi Haider Butt
{"title":"Covert network analysis to detect key players using correlation and social network analysis","authors":"Ejaz Farooq, S. Khan, Wasi Haider Butt","doi":"10.1145/3018896.3025142","DOIUrl":null,"url":null,"abstract":"The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3018896.3025142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.
隐蔽网络分析,以检测关键球员使用相关性和社会网络分析
世界范围内日益增多的恐怖事件引起了许多研究者对反恐问题的关注。这一领域要求他们为分析、识别和预测恐怖事件和集团领导人开发新的技术和方法做出贡献。在本文中,我们提出了一个从网络中检测关键参与者的模型,该模型关注他们的通信内容。该模型发现所有节点的通信内容与数据字典的相关性,并基于阈值相关性值检测节点。绘制一个新的网络并计算其密度。然后在新的网络上应用不同的中心性度量,并使用每个度量检测最重要的节点。这给了我们不同的关键参与者在网络中扮演不同的角色。数据字典由恐怖分子在通信中使用的单词或术语组成。我们使用安然电子邮件数据集来测试和验证我们提出的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信