A Survey on Terrorist Network Mining: Current Trends and Opportunities
نویسندگان
چکیده
Along with the modernization and widespread usage of Internet, the security of the mankind has become one of the major issues today. The threat of human society from the terrorists is the challenge faced dominantly. Advancement in the technology has not only helped the common people for the growth but also these inhuman people to adversely affect the society with sophisticated techniques. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed and detected. To achieve this, the law enforcement agencies are using data mining techniques as one of the effective solution. One such technique of data mining is Social network analysis which studies terrorist networks for the identification of relationships and associations that may exist between terrorist nodes. Terrorist activities can also be detected by means of analyzing Web traffic content. This paper studies social network analysis, web traffic content and explores various ways for identifying terrorist activities.
منابع مشابه
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
In today’s era of hi-tech technologies, criminals are easily fulfilling their inhuman goals against the mankind. Thus, the security of civilians has significantly become important. In this regard, the law-enforcement agencies are aiming to prevent future attacks. To do so, the terrorist networks are being analyzed using data mining techniques. One such technique is Social network analysis which...
متن کاملA Survey on Social Network Analysis for Counter-Terrorism
Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key players/ main actors of terrorist netw...
متن کاملNovel Algorithm for Terrorist Network Mining
The evolutionary effect of social network analysis has feasibly enabled the security agencies to include the approach for estimating terrorist networks. The approach in this sense named as Terrorist Network Mining, has helped in successfully achieving the terrorist network behaviour on web along with destabilization of network using hierarchy of algorithms. However these algorithm results in fr...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملViolent Jihad in the Netherlands Current trends in the Islamist terrorist threat Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat
Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat 2 3 Contents Foreword 5 Introduction 7 The murder of Theo van Gogh: consequences and effects 7 General trends in the development of jihadism 9 Framework of terms and definitions 10 1 From exogenous threat to home-grown terrorism 13 1.1 What is a jihadist network? 13 1.2 Historical development of network formation 1...
متن کامل