Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network

Relationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however,...

Full description

Bibliographic Details
Main Authors: Zhendong Su, Kaijun Ren, Ruoyun Zhang, Suo-Yi Tan
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8710256/
id doaj-9469690a078b4d7497afded42e3541d1
record_format Article
spelling doaj-9469690a078b4d7497afded42e3541d12021-03-29T22:42:36ZengIEEEIEEE Access2169-35362019-01-017616896169610.1109/ACCESS.2019.29159388710256Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers NetworkZhendong Su0Kaijun Ren1Ruoyun Zhang2Suo-Yi Tan3https://orcid.org/0000-0002-9108-2229School of Management, University of Science and Technology of China, Hefei, ChinaCollege of Computer and College of Meteorology and Oceanology, National University of Defense Technology, Changsha, ChinaCollege of Systems Engineering, National University of Defense Technology, Changsha, ChinaCollege of Computer and College of Meteorology and Oceanology, National University of Defense Technology, Changsha, ChinaRelationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however, most of the previous studies are based directly on the observed networks while neglecting an important fact that the observed networks may be incomplete. In this paper, we address the terrorist network disintegration problem based on link prediction. An effective method is proposed to find the critical nodes by the assistance of a link prediction algorithm. We make a case study of September 11th hijackers to illustrate our method. Five different disintegration strategies are applied to validate our method. The result shows that, with no more than 40% magnitude of missing information, by using the link prediction method to recover partial missing relationships information, our method can improve the network disintegration performance remarkably. Besides, we find that when the size of missing information is not too much, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the original network has been reshaped through the addition of some links by link prediction. As a result, the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.https://ieeexplore.ieee.org/document/8710256/Terrorist networknetwork disintegrationlink predictionnetwork analysis
collection DOAJ
language English
format Article
sources DOAJ
author Zhendong Su
Kaijun Ren
Ruoyun Zhang
Suo-Yi Tan
spellingShingle Zhendong Su
Kaijun Ren
Ruoyun Zhang
Suo-Yi Tan
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
IEEE Access
Terrorist network
network disintegration
link prediction
network analysis
author_facet Zhendong Su
Kaijun Ren
Ruoyun Zhang
Suo-Yi Tan
author_sort Zhendong Su
title Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_short Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_full Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_fullStr Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_full_unstemmed Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_sort disrupting terrorist networks based on link prediction: a case study of the 9–11 hijackers network
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Relationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however, most of the previous studies are based directly on the observed networks while neglecting an important fact that the observed networks may be incomplete. In this paper, we address the terrorist network disintegration problem based on link prediction. An effective method is proposed to find the critical nodes by the assistance of a link prediction algorithm. We make a case study of September 11th hijackers to illustrate our method. Five different disintegration strategies are applied to validate our method. The result shows that, with no more than 40% magnitude of missing information, by using the link prediction method to recover partial missing relationships information, our method can improve the network disintegration performance remarkably. Besides, we find that when the size of missing information is not too much, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the original network has been reshaped through the addition of some links by link prediction. As a result, the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.
topic Terrorist network
network disintegration
link prediction
network analysis
url https://ieeexplore.ieee.org/document/8710256/
work_keys_str_mv AT zhendongsu disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
AT kaijunren disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
AT ruoyunzhang disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
AT suoyitan disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
_version_ 1724191060697022464