Title :
Identifying key players in a covert network using behavioral profile
Author :
Karthika, S. ; Kiruthiga, A. ; Bose, S.
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ., Chennai, India
Abstract :
In recent day´s terrorism poses a threat to homeland security. It´s highly motivated by the “net-war” where the extremist are organized in a network structure. The knowledge discovery process in network analysis has been done using supervised and unsupervised techniques which helps us to differentiate overt and covert nodes in a social network. The major problem faced is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node attributes. An unsupervised framework is used to describe the nodes and links in the form of a directional semantic graph where each node is related with more than one relationship with others. The behaviors of nodes are analyzed based on the semantic profile generated. The semantic profile is described as a collection of condensed paths generated through variable relaxation approach. These condensed paths are called as path types and each of them have a unique format. To identify the key player the outlier analysis is done in the profile and the highly communicating node is concluded to be the most influential node of the network.
Keywords :
data mining; directed graphs; security of data; social networking (online); unsupervised learning; behavioral profile; centrality based approach; condensed paths; covert nodes; directional semantic graph; graph theoretic approach; homeland security; key player identification; knowledge discovery; net-war; network analysis; network structure; outlier analysis; overt nodes; path types; relational covert network; semantic profile generation; social network; supervised techniques; terrorism; unsupervised techniques; variable relaxation approach; Clustering algorithms; Feature extraction; Measurement; Mutual information; Semantics; Social network services; Terrorism; Key Player; Meta-constraints; Outlier Analysis; Semantic profile; Social Network Analysis (SNA); Terrorism; Unsupervised learning;
Conference_Titel :
Recent Trends In Information Technology (ICRTIT), 2012 International Conference on
Conference_Location :
Chennai, Tamil Nadu
Print_ISBN :
978-1-4673-1599-9
DOI :
10.1109/ICRTIT.2012.6206756