A Complex Networks Approach to Find Latent Clusters of Terrorist Groups
- URL: http://arxiv.org/abs/2001.03367v1
- Date: Fri, 10 Jan 2020 10:08:30 GMT
- Title: A Complex Networks Approach to Find Latent Clusters of Terrorist Groups
- Authors: Gian Maria Campedelli, Iain Cruickshank, and Kathleen M. Carley
- Abstract summary: We build a multi-partite network that includes terrorist groups and related information on tactics, weapons, targets, active regions.
We show that groups belonging to opposite ideologies can share very common behaviors and that Islamist/jihadist groups hold behavioral characteristics with respect to the others.
- Score: 5.746505534720595
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Given the extreme heterogeneity of actors and groups participating in
terrorist actions, investigating and assessing their characteristics can be
important to extract relevant information and enhance the knowledge on their
behaviors. The present work will seek to achieve this goal via a complex
networks approach. This approach will allow finding latent clusters of similar
terror groups using information on their operational characteristics.
Specifically, using open access data of terrorist attacks occurred worldwide
from 1997 to 2016, we build a multi-partite network that includes terrorist
groups and related information on tactics, weapons, targets, active regions. We
propose a novel algorithm for cluster formation that expands our earlier work
that solely used Gower's coefficient of similarity via the application of Von
Neumann entropy for mode-weighting. This novel approach is compared with our
previous Gower-based method and a heuristic clustering technique that only
focuses on groups' ideologies. The comparative analysis demonstrates that the
entropy-based approach tends to reliably reflect the structure of the data that
naturally emerges from the baseline Gower-based method. Additionally, it
provides interesting results in terms of behavioral and ideological
characteristics of terrorist groups. We furthermore show that the
ideology-based procedure tends to distort or hide existing patterns. Among the
main statistical results, our work reveals that groups belonging to opposite
ideologies can share very common behaviors and that Islamist/jihadist groups
hold peculiar behavioral characteristics with respect to the others.
Limitations and potential work directions are also discussed, introducing the
idea of a dynamic entropy-based framework.
Related papers
- Investigating Human-Identifiable Features Hidden in Adversarial
Perturbations [54.39726653562144]
Our study explores up to five attack algorithms across three datasets.
We identify human-identifiable features in adversarial perturbations.
Using pixel-level annotations, we extract such features and demonstrate their ability to compromise target models.
arXiv Detail & Related papers (2023-09-28T22:31:29Z) - Group Activity Recognition in Computer Vision: A Comprehensive Review,
Challenges, and Future Perspectives [0.0]
Group activity recognition is a hot topic in computer vision.
Recognizing activities through group relationships plays a vital role in group activity recognition.
This work examines the progress in technology for recognizing group activities.
arXiv Detail & Related papers (2023-07-25T14:44:41Z) - Improving Link Prediction in Social Networks Using Local and Global
Features: A Clustering-based Approach [0.0]
We propose an approach based on the combination of first and second group methods to tackle the link prediction problem.
Our two-phase developed method firstly determines new features related to the position and dynamic behavior of nodes.
Then, a subspace clustering algorithm is applied to group social objects based on the computed similarity measures.
arXiv Detail & Related papers (2023-05-17T14:45:02Z) - Decentralized Adversarial Training over Graphs [55.28669771020857]
The vulnerability of machine learning models to adversarial attacks has been attracting considerable attention in recent years.
This work studies adversarial training over graphs, where individual agents are subjected to varied strength perturbation space.
arXiv Detail & Related papers (2023-03-23T15:05:16Z) - Nested Dirichlet models for unsupervised attack pattern detection in honeypot data [0.0]
Clustering attacks appearing to share a common intent is very valuable to threat-hunting experts.
This article explores Dirichlet distribution topic models for clustering terminal session commands collected from honeypots.
The main practical implications of clustering the sessions are two-fold: finding similar groups of attacks, and identifying outliers.
arXiv Detail & Related papers (2023-01-06T13:26:44Z) - Ranking-based Group Identification via Factorized Attention on Social
Tripartite Graph [68.08590487960475]
We propose a novel GNN-based framework named Contextualized Factorized Attention for Group identification (CFAG)
We devise tripartite graph convolution layers to aggregate information from different types of neighborhoods among users, groups, and items.
To cope with the data sparsity issue, we devise a novel propagation augmentation layer, which is based on our proposed factorized attention mechanism.
arXiv Detail & Related papers (2022-11-02T01:42:20Z) - On the Robustness of Deep Clustering Models: Adversarial Attacks and
Defenses [14.951655356042947]
Clustering models constitute a class of unsupervised machine learning methods which are used in a number of application pipelines.
We propose a blackbox attack using Generative Adversarial Networks (GANs) where the adversary does not know which deep clustering model is being used.
We analyze our attack against multiple state-of-the-art deep clustering models and real-world datasets, and find that it is highly successful.
arXiv Detail & Related papers (2022-10-04T22:32:02Z) - Multi-modal Networks Reveal Patterns of Operational Similarity of
Terrorist Organizations [8.813290741555994]
We propose a novel computational framework for detecting clusters of terrorist groups sharing similar behaviors.
We show that over the years global terrorism has been characterized by increasing operational cohesiveness.
Third, we demonstrate that operational similarity between two organizations is driven by three factors.
arXiv Detail & Related papers (2021-12-15T09:50:11Z) - Towards A Conceptually Simple Defensive Approach for Few-shot
classifiers Against Adversarial Support Samples [107.38834819682315]
We study a conceptually simple approach to defend few-shot classifiers against adversarial attacks.
We propose a simple attack-agnostic detection method, using the concept of self-similarity and filtering.
Our evaluation on the miniImagenet (MI) and CUB datasets exhibit good attack detection performance.
arXiv Detail & Related papers (2021-10-24T05:46:03Z) - Detecting adversaries in Crowdsourcing [71.20185379303479]
This work investigates the effects of adversaries on crowdsourced classification, under the popular Dawid and Skene model.
The adversaries are allowed to deviate arbitrarily from the considered crowdsourcing model, and may potentially cooperate.
We develop an approach that leverages the structure of second-order moments of annotator responses, to identify large numbers of adversaries, and mitigate their impact on the crowdsourcing task.
arXiv Detail & Related papers (2021-10-07T15:07:07Z) - A black-box adversarial attack for poisoning clustering [78.19784577498031]
We propose a black-box adversarial attack for crafting adversarial samples to test the robustness of clustering algorithms.
We show that our attacks are transferable even against supervised algorithms such as SVMs, random forests, and neural networks.
arXiv Detail & Related papers (2020-09-09T18:19:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.