Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network

Relationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however,...

Full description

Bibliographic Details
Main Authors: Zhendong Su, Kaijun Ren, Ruoyun Zhang, Suo-Yi Tan
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8710256/
_version_ 1818875926883074048
author Zhendong Su
Kaijun Ren
Ruoyun Zhang
Suo-Yi Tan
author_facet Zhendong Su
Kaijun Ren
Ruoyun Zhang
Suo-Yi Tan
author_sort Zhendong Su
collection DOAJ
description Relationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however, most of the previous studies are based directly on the observed networks while neglecting an important fact that the observed networks may be incomplete. In this paper, we address the terrorist network disintegration problem based on link prediction. An effective method is proposed to find the critical nodes by the assistance of a link prediction algorithm. We make a case study of September 11th hijackers to illustrate our method. Five different disintegration strategies are applied to validate our method. The result shows that, with no more than 40% magnitude of missing information, by using the link prediction method to recover partial missing relationships information, our method can improve the network disintegration performance remarkably. Besides, we find that when the size of missing information is not too much, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the original network has been reshaped through the addition of some links by link prediction. As a result, the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.
first_indexed 2024-12-19T13:34:16Z
format Article
id doaj.art-9469690a078b4d7497afded42e3541d1
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-19T13:34:16Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-9469690a078b4d7497afded42e3541d12022-12-21T20:19:15ZengIEEEIEEE Access2169-35362019-01-017616896169610.1109/ACCESS.2019.29159388710256Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers NetworkZhendong Su0Kaijun Ren1Ruoyun Zhang2Suo-Yi Tan3https://orcid.org/0000-0002-9108-2229School of Management, University of Science and Technology of China, Hefei, ChinaCollege of Computer and College of Meteorology and Oceanology, National University of Defense Technology, Changsha, ChinaCollege of Systems Engineering, National University of Defense Technology, Changsha, ChinaCollege of Computer and College of Meteorology and Oceanology, National University of Defense Technology, Changsha, ChinaRelationships between terrorists are amorphous, invisible, distributed, and dispersed. The information on these networks is often incomplete and even erroneous. The key to disrupting the terrorists' network is to find the critical nodes whose removal will lead to network collapse, and however, most of the previous studies are based directly on the observed networks while neglecting an important fact that the observed networks may be incomplete. In this paper, we address the terrorist network disintegration problem based on link prediction. An effective method is proposed to find the critical nodes by the assistance of a link prediction algorithm. We make a case study of September 11th hijackers to illustrate our method. Five different disintegration strategies are applied to validate our method. The result shows that, with no more than 40% magnitude of missing information, by using the link prediction method to recover partial missing relationships information, our method can improve the network disintegration performance remarkably. Besides, we find that when the size of missing information is not too much, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the original network has been reshaped through the addition of some links by link prediction. As a result, the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.https://ieeexplore.ieee.org/document/8710256/Terrorist networknetwork disintegrationlink predictionnetwork analysis
spellingShingle Zhendong Su
Kaijun Ren
Ruoyun Zhang
Suo-Yi Tan
Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
IEEE Access
Terrorist network
network disintegration
link prediction
network analysis
title Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_full Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_fullStr Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_full_unstemmed Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_short Disrupting Terrorist Networks Based on Link Prediction: A Case Study of the 9–11 Hijackers Network
title_sort disrupting terrorist networks based on link prediction a case study of the 9 x2013 11 hijackers network
topic Terrorist network
network disintegration
link prediction
network analysis
url https://ieeexplore.ieee.org/document/8710256/
work_keys_str_mv AT zhendongsu disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
AT kaijunren disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
AT ruoyunzhang disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork
AT suoyitan disruptingterroristnetworksbasedonlinkpredictionacasestudyofthe9x201311hijackersnetwork