一种基于约束证据聚类的恐怖分子子群体检测新方法

Firas Saidi, Z. Trabelsi, H. Ghézala
{"title":"一种基于约束证据聚类的恐怖分子子群体检测新方法","authors":"Firas Saidi, Z. Trabelsi, H. Ghézala","doi":"10.1109/RCIS.2018.8406663","DOIUrl":null,"url":null,"abstract":"The emergence of web 2.0 virtual spaces, namely social networks and social media, enables terrorist organizations to flourish and advance their cyber malicious activities by posting criminal contents, exchanging information and polarizing new members. Thus, there is an immense need for the development of effective approaches to understand cyber terrorist organizations structures, working strategies, and operation tactics. A terrorist community is a set of subgroups, which share many properties but differ on others, such as degree of activity and roles. The identification of these sub-communities is a key task not only to understand the topology of these organizations but also to discover their operation methods. In this paper, we propose a cyber community detection approach based on Constrained Evidential C-Means (CECM) algorithm which is an adequate evidential clustering method that can be applied to detect cyber terrorist subgroups. Based on Must-link and Cannot-link constraints, objects (network members) can be classified into various sub-classes Cn, such as military, finance and local leaders committees. The membership of nodes to clusters (sub-communities) is described by Belief functions. Clustering results show the efficiency of our evidential constrained approach not only in classifying cyber terrorist actors into the aforementioned communities, but also in allocating a degree of membership for each member to each class.","PeriodicalId":408651,"journal":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"A novel approach for terrorist sub-communities detection based on constrained evidential clustering\",\"authors\":\"Firas Saidi, Z. Trabelsi, H. Ghézala\",\"doi\":\"10.1109/RCIS.2018.8406663\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emergence of web 2.0 virtual spaces, namely social networks and social media, enables terrorist organizations to flourish and advance their cyber malicious activities by posting criminal contents, exchanging information and polarizing new members. Thus, there is an immense need for the development of effective approaches to understand cyber terrorist organizations structures, working strategies, and operation tactics. A terrorist community is a set of subgroups, which share many properties but differ on others, such as degree of activity and roles. The identification of these sub-communities is a key task not only to understand the topology of these organizations but also to discover their operation methods. In this paper, we propose a cyber community detection approach based on Constrained Evidential C-Means (CECM) algorithm which is an adequate evidential clustering method that can be applied to detect cyber terrorist subgroups. Based on Must-link and Cannot-link constraints, objects (network members) can be classified into various sub-classes Cn, such as military, finance and local leaders committees. The membership of nodes to clusters (sub-communities) is described by Belief functions. Clustering results show the efficiency of our evidential constrained approach not only in classifying cyber terrorist actors into the aforementioned communities, but also in allocating a degree of membership for each member to each class.\",\"PeriodicalId\":408651,\"journal\":{\"name\":\"2018 12th International Conference on Research Challenges in Information Science (RCIS)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 12th International Conference on Research Challenges in Information Science (RCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RCIS.2018.8406663\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RCIS.2018.8406663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

摘要

web 2.0虚拟空间即社交网络和社交媒体的出现,使恐怖组织能够通过发布犯罪内容、交换信息、分化新成员等方式蓬勃发展和推进网络恶意活动。因此,迫切需要开发有效的方法来了解网络恐怖组织的结构、工作策略和操作战术。恐怖分子社区是一组子组织,它们有许多共同的特性,但在其他方面有所不同,比如活动程度和角色。识别这些子社区不仅是了解这些组织的拓扑结构,而且是发现它们的操作方法的关键任务。本文提出了一种基于约束证据c均值(Constrained evidence C-Means, CECM)算法的网络社区检测方法,该算法是一种足够的证据聚类方法,可用于网络恐怖分子子群体的检测。根据“必须链接”和“不能链接”的约束,对象(网络成员)可以分为不同的子类Cn,如军事、金融、地方领导委员会等。节点对集群(子群体)的隶属关系由信念函数描述。聚类结果表明,我们的证据约束方法不仅在将网络恐怖分子行为者分类到上述社区方面是有效的,而且在为每个类别的每个成员分配成员程度方面也是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A novel approach for terrorist sub-communities detection based on constrained evidential clustering
The emergence of web 2.0 virtual spaces, namely social networks and social media, enables terrorist organizations to flourish and advance their cyber malicious activities by posting criminal contents, exchanging information and polarizing new members. Thus, there is an immense need for the development of effective approaches to understand cyber terrorist organizations structures, working strategies, and operation tactics. A terrorist community is a set of subgroups, which share many properties but differ on others, such as degree of activity and roles. The identification of these sub-communities is a key task not only to understand the topology of these organizations but also to discover their operation methods. In this paper, we propose a cyber community detection approach based on Constrained Evidential C-Means (CECM) algorithm which is an adequate evidential clustering method that can be applied to detect cyber terrorist subgroups. Based on Must-link and Cannot-link constraints, objects (network members) can be classified into various sub-classes Cn, such as military, finance and local leaders committees. The membership of nodes to clusters (sub-communities) is described by Belief functions. Clustering results show the efficiency of our evidential constrained approach not only in classifying cyber terrorist actors into the aforementioned communities, but also in allocating a degree of membership for each member to each class.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信