While reading up on outlier
cohesion analysis in collaborative social networks, I came across this article which
I found pretty interesting in the security niche; “Structural Analysis and
Destabilizing Terrorist Networks” by N.
Memon et al. The article discusses key areas in network analysis such as
(i) cohesion analysis (such as cliques, ncliques, n-clans
and k-plex) to determine familiarity, robustness and reachability.
(ii) role analysis (such as position role index) to
determine critical nodes and
(iii) power analysis (such as degree centrality, Eigenvector centrality and dependence centrality)
This work has further
been refined and published as IEEE conference on intelligence security and ADMA
Practical
Algorithms for Destabilizing Terrorist
Networks
N Memon, HL Larsen - Proceedings of IEEE Conference on
Intelligence Security …, 2006 – Springer
And
Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using
Investigative Data …
N Memon, HL Larsen - … Conference on Advanced Data Mining Applications (ADMA 2006),
2006 – Springer
From
a generic covert network perspective, there has been previously a lot of work
done for darkNet exploration, automated discovery for nodes with case studies
in Allpeers, anoNet, Freenet, GNUnet, I2P , Tor, Turtle F2F and WASTE.
A good
overview can be found here.
Destabilizing dynamic covert networks
KM Carley, M Dombroski, M Tsvetovat, J Reminga, N … - Proceedings
of the 8th International Command and Control …, 2003 - casos.cs.cmu.edu
The problem of network
outliers is not only crucial in intrusion detection but also an interesting
network theory problem where a leaf node posses attributes out of the ordinary.
As discussed by N. Memon et al for the social aspect of network; “The analysis
of the interaction structures that is involved in social network analysis is an
important element in the analysis of the micro-macro link, the way in which individual
behavior and social phenomena are connected with one another. In this
perspective, social networks are both the cause of and the result of individual
behavior.”
References from the
paper and further readings
- http://en.wikipedia.org/wiki/Network_theory
- Social Network :: Wikipedia
- http://trackingthethreat.com/
1. Scott, J.: Social
Network Analysis: A Handbook, 2 edn. Sage Publications, London 2000.
2. Wasserman, S., Faust,
K.: Social Network Analysis. Cambridge University Press.1994.
3. Sageman, M.:
Understanding Terrorist Networks. University of Pennsylvania Press, 2004.
4. Berry, N., Ko, T.,
Moy, T., Smrcka, J., Turnley, J., Wu, B.: Emergent clique formation in
terrorist recruitment. The AAAI- 04 Workshop on Agent Organizations: Theory and
Practice, July 25, 2004, San Jose, California, 2004. http://www.cs.uu.nl/virginia/aotp/papers.htm
5. McAndrew, D.: The
structural analysis of criminal networks. In: D. Canter, L. Alison (eds.) The
Social Psychology of Crime: Groups, Teams, and Networks, Offender Profiling
Series, III.Aldershot, Dartmouth ,1999.
6. Davis, R.H.: Social
network analysis: An aid in conspiracy investigations. FBI Law Enforcement
Bulletin pp. 11–19, 1981.
7. Chen, H., Chung, W.,
Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: A general framework
and some examples. Computer 37(4), 50–56, 2004.
8. Krebs, V.: Mapping
networks of terrorist cells. Connections 24, 45–52, 2002.
9. Bonacich, P., Power
and Centrality. American Journal of Sociology 92: 1170-1184, 1987.
10. Burt, R. S.,
Structural Holes, Cambridge, MA: Harvard University Press, 1992.
11. Hanneman, R. E.,
Introduction to Social Network Methods.Online Textbook Supporting Sociology
175. Riverside, CA: University of California, 200.
12. Burt, R. S.,
Structure, A General Purpose Network Analysis Program. Reference Manual,
Newyork: Columbia University, 1990.
13. Luce, R., Perry, A.:
A method of matrix analysis of group structure. Psychometrika 14, 95–116, 1949.
14. Seidman, S.B.,
Foster, B.L.: A graph theoretic generalization of the clique concept. Journal
of Mathematical Sociology 6, 139–154, 1978.
15. Freeman, L.C.: The
sociological concept of “group”: An empirical test of two models. American
Journal of Sociology98, 152–166 ,1992.
16. Luce, R.:
Connectivity and generalized cliques in sociometric group structure.
Psychometrika 15, 169–190, 1950.
17. Mokken, R.: Cliques,
clubs and clans. Quality and Quantity 13, 161–173, 1979.
18. Balasundaram, B.,
Butenko, S., Trukhanov, S.: Novel approaches for analyzing biological networks.
Journal of Combinatorial Optimization 10, 23–39, 2005.
19. Latora, V., Massimo
Marchiori How Science of Complex Networks can help in developing Strategy
against Terrorism, Chaos, Solitons and Fractals 20, 69-75, 2004.
20. Memon, N. Henrik
Legind Larsen, Practical Algorithms for Destabilizing Terrorist Networks, In
Proceedings of IEEE Intelligence Security Conference (ISI 2006), San Diego, California,
USA (to appear), 2006.
Newman, M. E. J. The structure and function of
complex networks, SIAM Review 45, 167- 256, 2003.
And on a humorous side, here is an interesting video about how NOT to do it.:)