{"title":"A study of the effectiveness of the Profile Closeness Attack on the Sicilian Mafia Network","authors":"Divya P B, T. Johnson, Kannan Balakrishnan","doi":"10.1109/ICITIIT57246.2023.10068719","DOIUrl":null,"url":null,"abstract":"This paper examines the vulnerability of the Sicil-ian Mafia Network to various central-attack strategies. Social Network Analysis tools are proved to be most effective method in understanding and analysing terrorist networks. The fallback strategy is a good option when the critical nodes are protected. We have performed simultaneous and sequential attacks on the network under different attack strategies. This work assesses the effectiveness of fallback strategy on a data set of Sicilian Mafia Network. We analyze two different data sets generated by phone calls and direct meeting between the suspected criminals. The results shows that the phone call networks are very much vulnerable to the fallback strategy while it is not the case in meeting networks.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITIIT57246.2023.10068719","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper examines the vulnerability of the Sicil-ian Mafia Network to various central-attack strategies. Social Network Analysis tools are proved to be most effective method in understanding and analysing terrorist networks. The fallback strategy is a good option when the critical nodes are protected. We have performed simultaneous and sequential attacks on the network under different attack strategies. This work assesses the effectiveness of fallback strategy on a data set of Sicilian Mafia Network. We analyze two different data sets generated by phone calls and direct meeting between the suspected criminals. The results shows that the phone call networks are very much vulnerable to the fallback strategy while it is not the case in meeting networks.