Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
Relationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however,...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8710256/ |
id |
doaj-9469690a078b4d7497afded42e3541d1 |
---|---|
record_format |
Article |
spelling |
doaj-9469690a078b4d7497afded42e3541d12021-03-29T22:42:36ZengIEEEIEEE Access2169-35362019-01-017616896169610.1109/ACCESS.2019.29159388710256Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers NetworkZhendong Su0Kaijun Ren1Ruoyun Zhang2Suo-Yi Tan3https://orcid.org/0000-0002-9108-2229School of Management, University of Science and Technology of China, Hefei, ChinaCollege of Computer and College of Meteorology and Oceanology, National University of Defense Technology, Changsha, ChinaCollege of Systems Engineering, National University of Defense Technology, Changsha, ChinaCollege of Computer and College of Meteorology and Oceanology, National University of Defense Technology, Changsha, ChinaRelationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however, most of the previous studies are based directly on the observed networks while neglecting an important fact that the observed networks may be incomplete. In this paper, we address the terrorist network disintegration problem based on link prediction. An effective method is proposed to find the critical nodes by the assistance of a link prediction algorithm. We make a case study of September 11th hijackers to illustrate our method. Five different disintegration strategies are applied to validate our method. The result shows that, with no more than 40% magnitude of missing information, by using the link prediction method to recover partial missing relationships information, our method can improve the network disintegration performance remarkably. Besides, we find that when the size of missing information is not too much, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the original network has been reshaped through the addition of some links by link prediction. As a result, the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.https://ieeexplore.ieee.org/document/8710256/Terrorist networknetwork disintegrationlink predictionnetwork analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhendong Su Kaijun Ren Ruoyun Zhang Suo-Yi Tan |
spellingShingle |
Zhendong Su Kaijun Ren Ruoyun Zhang Suo-Yi Tan Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network IEEE Access Terrorist network network disintegration link prediction network analysis |
author_facet |
Zhendong Su Kaijun Ren Ruoyun Zhang Suo-Yi Tan |
author_sort |
Zhendong Su |
title |
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network |
title_short |
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network |
title_full |
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network |
title_fullStr |
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network |
title_full_unstemmed |
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network |
title_sort |
disrupting terrorist networks based on link prediction: a case study of the 9–11 hijackers network |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Relationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however, most of the previous studies are based directly on the observed networks while neglecting an important fact that the observed networks may be incomplete. In this paper, we address the terrorist network disintegration problem based on link prediction. An effective method is proposed to find the critical nodes by the assistance of a link prediction algorithm. We make a case study of September 11th hijackers to illustrate our method. Five different disintegration strategies are applied to validate our method. The result shows that, with no more than 40% magnitude of missing information, by using the link prediction method to recover partial missing relationships information, our method can improve the network disintegration performance remarkably. Besides, we find that when the size of missing information is not too much, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the original network has been reshaped through the addition of some links by link prediction. As a result, the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized. |
topic |
Terrorist network network disintegration link prediction network analysis |
url |
https://ieeexplore.ieee.org/document/8710256/ |
work_keys_str_mv |
AT zhendongsu disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork AT kaijunren disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork AT ruoyunzhang disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork AT suoyitan disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork |
_version_ |
1724191060697022464 |