Identifying criminal organizations from their social network structures

被引:1
|
作者
Cinar, Muhammet Serkan [1 ]
Genc, Burkay [2 ]
Sever, Hayri [3 ]
机构
[1] Hacettepe Univ, Fac Engn, Dept Comp Engn, Ankara, Turkey
[2] Hacettepe Univ, Inst Populat Studies, Dept Policy & Strategy Studies, Ankara, Turkey
[3] Cankaya Univ, Fac Engn, Dept Comp Engn, Ankara, Turkey
关键词
Criminal networks; identification; decision tree; motif analysis; machine learning; ALGORITHM; MOTIFS; MODEL;
D O I
10.3906/elk-1806-52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identification of criminal structures within very large social networks is an essential security feat. By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act. We evaluate the effectiveness of three different methods for classifying an unknown network as terrorist, cocaine, or noncriminal. We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis. The empirical results show that these three methods can provide significant improvements in distinguishing all three network types. We show that these methods are viable enough to be used as supporting evidence by security forces in their fight against criminal organizations operating on social networks.
引用
收藏
页码:421 / 436
页数:16
相关论文
共 50 条
  • [1] Identifying individuals associated with organized criminal networks: A social network analysis
    Basu, Kaustav
    Sen, Arunabha
    SOCIAL NETWORKS, 2021, 64 : 42 - 54
  • [2] Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis
    Duy Dang-Pham
    Kautz, Karlheinz
    Ai-Phuong Hoang
    Pittayachawan, Siddhi
    COMPUTERS & SECURITY, 2022, 112
  • [3] Identifying a Criminal's Network of Trust
    Magalingam, Pritheega
    Rao, Asha
    Davis, Stephen
    10TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY AND INTERNET-BASED SYSTEMS SITIS 2014, 2014, : 309 - 316
  • [4] Identifying Network Attacks from a Social Perspective
    Hopper, Lindsay
    Hopper, Ronald
    Womble, Phillip
    2009 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2009, : 503 - 507
  • [5] Focal structures analysis: identifying influential sets of individuals in a social network
    Şen F.
    Wigand R.
    Agarwal N.
    Tokdemir S.
    Kasprzyk R.
    Şen, Fatih (fsen@uthsc.edu), 1600, Springer-Verlag Wien (06):
  • [6] Shortlisting the Influential Members of Criminal Organizations and Identifying Their Important Communication Channels
    Taha, Kamal
    Yoo, Paul D.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 1988 - 1999
  • [7] Social Capital in Network Organizations
    Alqithami, Saad
    Hexmoor, Henry
    PROCEEDINGS OF THE TWENTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2014, : 3090 - 3091
  • [8] Research on Social Network Data Analysis and Criminal Network Identification in Criminal Law
    Yang, Zhaoyu
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [9] Identifying Social Network Effects
    Dolton, Peter
    ECONOMIC RECORD, 2017, 93 : 1 - 15
  • [10] Identifying the Capacity of a Social Network
    M. A. Tolstykh
    Moscow University Computational Mathematics and Cybernetics, 2024, 48 (1) : 59 - 64