skip to main content
10.1145/3110025.3110153acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

A Generative Model for the Layers of Terrorist Networks

Authors Info & Claims
Published:31 July 2017Publication History

ABSTRACT

Data about terrorist networks is sparse and not consistently tagged as desired for research. Moreover, such data collections are hard to come across, which makes it challenging to propose solutions for the dynamic phenomenon driving these networks. This creates the need for generative network models based on the existing data.

Dark networks show different characteristics than the other scale-free real world networks, in order to maintain the covert nature while remaining functional. In this work, we present the analysis of the layers of three terrorist multilayered networks. Based on our analysis, we categorize these layers into two types: evolving and mature. We propose generative models to create synthetic dark layers of both types. The proposed models are validated using the available datasets and results show that they can be used to generate synthetic layers having properties similar to the original networks' layers.

References

  1. Jennifer Xu and Hsinchun Chen. The topology of dark networks. Communications of the ACM, 51(10):58--65, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cunningham, Daniel. The Boko Haram Network. [Machine-readable data file]. https://sites.google.com/site/sfeverton18/research/appendix-1, June 2014. Online; Accessed 30 January 2017.Google ScholarGoogle Scholar
  3. Daniel Cunningham, Sean Everton, Greg Wilson, Carlos Padilla, and Doug Zimmerman. Brokers and key players in the internationalization of the FARC. Studies in Conflict & Terrorism, 36(6):477--502, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  4. Roberts, Nancy and Sean F. Everton. Terrorist Data: Noordin Top Terrorist Network. https://sites.google.com/site/sfeverton18/research/appendix-1, June 2011. Online; Accessed 30 Jan 2017.Google ScholarGoogle Scholar
  5. Ralucca Gera, Ryan Miller, Miguel MirandaLopez, Scott Warnke, and Akrati Saxena. Three is the answer: Combining relationships to analyze multilayered terrorist networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2017 IEEE/ACM. IEEE, 2017.Google ScholarGoogle Scholar
  6. Jörg Raab and H Brinton Milward. Dark networks as problems. Journal of public administration research and theory, 13(4):413--439, 2003. Google ScholarGoogle ScholarCross RefCross Ref
  7. Brian Crawford, Ralucca Gera, Ryan Miller, and Bijesh Shrestha. Community evolution in multiplex layer aggregation. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM, pages 1229--1237. IEEE, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  8. Vy Le. Organised crime typologies: Structure, activities and conditions. International Journal of Criminology and Sociology, 1:121--131, 2012. Google ScholarGoogle ScholarCross RefCross Ref
  9. Ryan Miller. Purpose-driven communities in multiplex networks: Thresholding user-engaged layer aggregation. Master's Thesis, 2016.Google ScholarGoogle Scholar
  10. Scott Warnke. Partial information community detection in a multilayered network. Master's Thesis, 2016.Google ScholarGoogle Scholar
  11. Pivithuru Wijegunawardana, Vatsal Ojha, Ralucca Gera, and Sucheta Soundarajan. Seeing red: Locating people of interest in networks. In Workshop on Complex Networks CompleNet, pages 141--150. Springer, 2017. Google ScholarGoogle ScholarCross RefCross Ref
  12. Brian Crawford, Ralucca Gera, Jeffrey House, Thomas Knuth, and Ryan Miller. Graph structure similarity using spectral graph theory. In International Workshop on Complex Networks and their Applications, pages 209--221. Springer, 2016.Google ScholarGoogle Scholar
  13. L. Alonso, Brian Crawford, Ralucca Gera, Jeffrey House, Thomas Knuth, J.A. Méndez-Bermúdez, and Ryan Miller. Identifying network structure similarity using spectral graph theory. Applied Network Science, 2017.Google ScholarGoogle Scholar
  14. Manlio De Domenico, Albert Solé-Ribalta, Emanuele Cozzo, Mikko Kivelä, Yamir Moreno, Mason A Porter, Sergio Gómez, and Alex Arenas. Mathematical formulation of multilayer networks. Physical Review X, 3(4):041022, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  15. Mikko Kivelä, Alex Arenas, Marc Barthelemy, James P Gleeson, Yamir Moreno, and Mason A Porter. Multilayer networks. Journal of Complex Networks, 2(3):203--271, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  16. Stefano Boccaletti, Ginestra Bianconi, Regino Criado, Charo I Del Genio, Jesús Gómez-Gardenes, Miguel Romance, Irene Sendina-Nadal, Zhen Wang, and Massimiliano Zanin. The structure and dynamics of multilayer networks. Physics Reports, 544(1):1--122, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  17. Alessio Cardillo, Jesús Gómez-Gardeñes, Massimiliano Zanin, Miguel Romance, David Papo, Francisco del Pozo, and Stefano Boccaletti. Emergence of network features from multiplexity. Scientific Reports, 3:1344, feb 2013. Google ScholarGoogle ScholarCross RefCross Ref
  18. Jung Yeol Kim and K-I Goh. Coevolution and correlated multiplexity in multiplex networks. Physical review letters, 111(5):058702, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  19. Matteo Magnani and Luca Rossi. The ml-model for multi-layer social networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2011 International Conference on, pages 5--12. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Vincenzo Nicosia, Ginestra Bianconi, Vito Latora, and Marc Barthelemy. Growing multiplex networks. Physical review letters, 111(5):058701, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  21. Vincenzo Nicosia and Vito Latora. Measuring and modeling correlations in multiplex networks. Physical Review E, 92(3):032805, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  22. Manlio De Domenico, Albert Solé-Ribalta, Elisa Omodei, Sergio Gómez, and Alex Arenas. Ranking in interconnected multilayer networks reveals versatile nodes. Nature communications, 6, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  23. Sebastian Funk and Vincent AA Jansen. Interacting epidemics on overlay networks. Physical Review E, 81(3):036118, 2010. Google ScholarGoogle ScholarCross RefCross Ref
  24. Vincent Marceau, Pierre-André Noël, Laurent Hébert-Dufresne, Antoine Allard, and Louis J Dubé. Modeling the dynamical interaction between epidemics on overlay networks. Physical Review E, 84(2):026105, 2011. Google ScholarGoogle ScholarCross RefCross Ref
  25. Byungjoon Min, Su Do Yi, Kyu-Min Lee, and K-I Goh. Network robustness of multiplex networks with interlayer degree correlations. Physical Review E, 89(4):042811, 2014. Google ScholarGoogle ScholarCross RefCross Ref
  26. AN Patrinos and SL Hakimi. Relations between graphs and integer-pair sequences. Discrete Mathematics, 15(4):347--358, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ginestra Bianconi. The entropy of randomized network ensembles. EPL (Europhysics Letters), 81(2):28005, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  28. Ove Frank and David Strauss. Markov graphs. Journal of the american Statistical association, 81(395):832--842, 1986. Google ScholarGoogle ScholarCross RefCross Ref
  29. Juyong Park and Mark EJ Newman. Statistical mechanics of networks. Physical Review E, 70(6):066117, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  30. Garry Robins, Pip Pattison, Yuval Kalish, and Dean Lusher. An introduction to exponential random graph (p*) models for social networks. Social networks, 29(2):173--191, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  31. Ginestra Bianconi. Statistical mechanics of multiplex networks: Entropy and overlap. Physical Review E, 87(6):1--15, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  32. Akrati Saxena and SRS Iyengar. Evolving models for meso-scale structures. In Communication Systems and Networks (COMSNETS), 2016 8th International Conference on, pages 1--8. IEEE, 2016. Google ScholarGoogle ScholarCross RefCross Ref
  33. Albert-László Barabási and Réka Albert. Emergence of scaling in random networks. science, 286(5439):509--512, 1999.Google ScholarGoogle Scholar
  34. Alain Barrat, Marc Barthelemy, Romualdo Pastor-Satorras, and Alessandro Vespignani. The architecture of complex weighted networks. Proceedings of the National Academy of Sciences of the United States of America, 101(11):3747--3752, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  35. Mark EJ Newman. Mixing patterns in networks. Physical Review E, 67(2):026126, 2003. Google ScholarGoogle ScholarCross RefCross Ref
  36. Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10):1--13, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  37. Stephen B Seidman. Network structure and minimum degree. Social networks, 5(3):269--287, 1983. Google ScholarGoogle ScholarCross RefCross Ref
  38. Edward A Bender and E Rodney Canfield. The asymptotic number of labeled graphs with given degree sequences. Journal of Combinatorial Theory, Series A, 24(3):296--307, 1978. Google ScholarGoogle ScholarCross RefCross Ref
  39. https://github.com/VGCastro2011/Terrorist-Network-Generative-Models, 2017.Google ScholarGoogle Scholar
  1. A Generative Model for the Layers of Terrorist Networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
        July 2017
        698 pages
        ISBN:9781450349932
        DOI:10.1145/3110025

        Copyright © 2017 ACM

        © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 July 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate116of549submissions,21%

        Upcoming Conference

        KDD '24
      • Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader