Covert Network Analysis to Detect Key Players using Correlation and Social Network Analysis

被引:2
|
作者
Farooq, Ejaz [1 ]
Khan, Shoab A. [1 ]
Butt, Wasi Haider [1 ]
机构
[1] Natl Univ Sci & Technol NUST, Dept Comp Engn, H-12, Islamabad, Pakistan
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) | 2017年
关键词
Key player; preprocessing; similarity measures; CENTRALITY;
D O I
10.1145/3018896.3025142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing terrorist events across all over the world have attracted the attention of many researchers towards counter-terrorism. This field demands from them to contribute in developing new techniques and methods for analysis, identification and prediction of terrorist events and group leaders. In this paper, we propose a model to detect key players from a network keeping focus on their communication contents. The proposed model finds correlation of communication contents of all nodes with data dictionary and detects nodes based on a threshold correlation value. A new network is drawn and its density is calculated. After that different centrality measures are applied on new network and most important nodes detected using each measure. That gives us different key players with different roles in the network. Data dictionary consists of words or terms used by the terrorist in their communication. We used Enron email data set to test and validate our proposed model.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns
    Wendzel, Steffen
    Mazurczyk, Wojciech
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1739 - 1741
  • [22] Monetization and Services on a Real Online Social Network Using Social Network Analysis
    Ngonmang, Blaise
    Viennet, Emmanuel
    Sean, Savaneary
    Stepniewski, Philippe
    Fogelman-Soulie, Francoise
    Kirche, Remi
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 185 - 193
  • [23] Social network analysis approach to identify agricultural key communicators
    Yamini, T.
    Venkatesan, P.
    Jyothi, V.
    Devy, M. R.
    Rao, V. S.
    Suseela, K.
    JOURNAL OF ENVIRONMENTAL BIOLOGY, 2024, 45 (06): : 788 - 797
  • [24] Social Network Analysis Identifies Key Participants in Conservation Development
    Cooper M. Farr
    Sarah E. Reed
    Liba Pejchar
    Environmental Management, 2018, 61 : 732 - 740
  • [25] Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums
    Samtani, Sagar
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 319 - 321
  • [26] Social Network Analysis Identifies Key Participants in Conservation Development
    Farr, Cooper M.
    Reed, Sarah E.
    Pejchar, Liba
    ENVIRONMENTAL MANAGEMENT, 2018, 61 (05) : 732 - 740
  • [27] Identification of Key Opinion Leaders in Healthcare Domain using weighted Social Network Analysis
    Gotecha, Mayur R.
    Patwardhan, Manasi S.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [28] A multi-feature approach to detect Stegobot: a covert multimedia social network botnet
    Venkatachalam, Natarajan
    Anitha, R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 6079 - 6096
  • [29] Social Network Analysis of Network Communities
    Yan, Qiang
    Tang, Min
    EIGHTH INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, PROCEEDINGS, 2009, : 34 - 34
  • [30] A multi-feature approach to detect Stegobot: a covert multimedia social network botnet
    Natarajan Venkatachalam
    R. Anitha
    Multimedia Tools and Applications, 2017, 76 : 6079 - 6096