Discovering Hidden Networks in On-line Social Networks

Full Text (PDF, 511KB), PP.44-54

Views: 0 Downloads: 0

Author(s)

Pooja Wadhwa 1,* M.P.S Bhatia 1

1. Netaji Subhas Institute of Technology, Sector 3, Dwarka, New Delhi, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2014.05.04

Received: 4 Aug. 2013 / Revised: 16 Nov. 2013 / Accepted: 20 Jan. 2014 / Published: 8 Apr. 2014

Index Terms

Rule based Classification, Data Mining, Topic based Social Network Analysis, Security Mining

Abstract

Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

Cite This Paper

Pooja Wadhwa, M.P.S Bhatia, "Discovering Hidden Networks in On-line Social Networks", International Journal of Intelligent Systems and Applications(IJISA), vol.6, no.5, pp.44-54, 2014. DOI:10.5815/ijisa.2014.05.04

Reference

[1]“Framework for Understanding Terrorist Use of the Internet”. Technical Report, Canadian Centre for Intelligence and Security Studies, Trends in Terrorism Series, ITAC, Volume 2006-2.

[2]Declan Mc.. ‘White House: need to monitor online ‘extremism’’. 2011. http://news.cnet.com/8301-31921_3-20087677-281/white-house-need-to-monitor-online-extremism/

[3]Muhammad A.S and Wang J. “Investigative Data Mining: Identifying Key Nodes in Terrorist Networks”, 2006, IEEE.

[4]Nasrullah M. and Abdul Q.R. “Investigative data mining and its Application in Counterterrorism”. In theProceedings of the 5th WSEAS International Conference on Applied Informatics and Communications, 2005.

[5]Chau M. and Xu. J. “Mining communities and their relationships in blogs: A study of online hate groups”, In the International Journal of Human-Computer Studies 65 (2007) 57-70, Elsevier.

[6]Wadhwa P. and Bhatia M.P.S. “Tracking On-line Radicalization Using Investigative Data Mining”, National Conference on Communications (NCC), pages 1-5, 2013, New Delhi, India.

[7]Roberts N.C. “Tracking and disrupting dark networks: Challenges of data collection and analysis”, Information Systems Frontier (2011) 13:5-19. DOI 10.1007/s10796-010-9271-z.

[8]Wasserman S. & Faust K. Social Network Analysis: methods and applications. 1994, Cambridge University Press, Cambridge.

[9]Sparrow M.K. “The application of network analysis to criminal intelligence: An assessment of the prospects”, Social Networks, Volume13, Issue 3, Pages 251-254, 1991, Elsevier.

[10]Xu J.J and Chen H. “CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery”, ACM Transactions on Information Systems, Vol. 23, No.2, April 2005, Pages 201-226, Broadway, New York, NY 10036, USA.

[11]Xu J. and Chen H. “Criminal Network Analysis and Visualization”, Communications of the ACM, Vol. 48, No.6, 2005.

[12] Yang C.C, Ng. T.D. “Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization”, In the proceedings of Intelligence and Security Informatics, pages 55-58, IEEE, 2007.

[13]Chen H., Chung W.,Xu J., Qin, Y.W.G and Chau M. “Crime Data Mining: A General Framework and Some Examples”, IEEE Computer Society, 2004. 

[14]Duo-Yong S., Shu-Quan G., Hai Z. and Ben-Xian L. “Study on Covert Networks of Terroristic Organizations Based on Text Analysis”, 2011, IEEE.

[15]Duo-Yong S., Shu-Quan G., Ben-Xian L. and Xiao-Peng L.. “Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis”, 2011, IEEE.

[16]L’Huillier G., Alvarez H., Rios A.S. and Aguilera F. “Topic- Based Social Network Analysis for Virtual Communities of Interests in the Dark Web”. In the proceedings of ISI-KDD 2010, Washington, D.C., USA.

[17]Gargi U., Lu W., Mirrokni V. and Yoon S. “Large-Scale Community Detection on YouTube for Topic Discovery and Exploration”, Association for the Advancement of Artificial Intelligence (www.aaai.org), 2011.

[18]Klerks P., (2001), “The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands”, Connections 24(3): 53-65, 2001, INSNA.

[19]Hu D., Kaza S. and Chen H.. “Identifying significant facilitators of dark network evolution”, Journal of the American Society for Information Science & Technology, Vol. 60, Issue 4, April 2009, Pages 655-665, John Wiley & Sons, Inc. New York, NY, USA.

[20]Barabasi A.L, Jeong H., Zeda Z., Ravasz E., Schubert A. and Vicsek T. “evolution of the Social Network of Scientific Collaborations”, Physics A, pp 590-64,2002.

[21]Cogan P., Andrews M., Bradonjic M., Tucci G., Kennedy S. W. and Sala A. “Reconstruction and Analysis of Twitter Conversation Graphs”, Proceedings of the first ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research (HotSocial’12), 2012, pages 25-31, ACM.

[22]Wadhwa P. and Bhatia M.P.S. “Analyzing Radicalization on Twitter”, Second Student Research Symposium (SRS), International Conference on Advances in Computing, Communications and Informatics (ICACCI’13), 22 – 25 August 2013, Mysore, India in Press.

[23]Wadhwa P. and Bhatia M.P.S. “Classification of Radical Messages in Twitter using Security Associations”. Accepted in Book on Case Studies in Secure/ Intelligent Computing- Achievement and Trends, To be Published by Taylor and Francis.

[24]Xu J., Marshall B., Kaza S. and Chen H. “Analyzing and Visualizing Criminal Network Dynamics: A Case Study”, Intelligence and Security Informatics, lecture Notes in Computer Science Volume 3073, pp 359-377, 2004, Springer.