Hidden Members and Key Players Detection in Covert Networks Using Multiple Heterogeneous Layers

نویسندگان

  • Wasi H. Butt
  • Usman Qamar
  • Shoab A. Khan
چکیده

National security is one of the biggest challenges of the world today because of the number of terrorist incidents occurring across the world. It has been seen that suspicious individuals work in very organized groups. They hide themselves between common public and communicate through different media. The whole network is often organized in such a way that all members may not be directly interacting; rather they may be interacting through different mediators and may be using different media for interaction. This type of group is difficult to identify completely because of the presence of mediators and also different media of communication. In order to mitigate the potential risk of terrorist activities, such organized groups are required to be destabilized which is a big challenge for national security organizations. In this paper we propose a new model for detecting such networks. Detection is done by integrating databases having records of associations of suspicious individuals from different domains.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On a dynamic topology of covert groups

The problem of detecting hidden communities in large-scale networks has a long history in traffic analysis from secret societies evading detection to spy agencies datamining call record information looking for criminals. Graph theoretic partitioning is a well studied topic in both computer science and sociology. However, these methods are based on discovering communities by the narrow intuition...

متن کامل

Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier

National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. Use of different subfields of information technology has also gained much attraction of researchers and practitioners to design systems which can detect main members which are actually responsible for such kind of events. In this paper, we present a novel method to predict...

متن کامل

Network Structure Mining: Locating and isolating core members in covert terrorist networks

Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure...

متن کامل

Covert Channels and Anonymous Communication in Ad Hoc Networks

Title of dissertation: COVERT CHANNELS AND ANONYMOUS COMMUNICATION IN AD HOC NETWORKS Song Li Doctor of Philosophy, 2007 Dissertation directed by: Professor Anthony Ephremides Department of Electrical and Computer Engineering Ad-hoc wireless networks distinguish themselves from their traditional wired counterparts by three unique characteristics: mobility, lack of infrastructure, and shared wir...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014