Nothing Special   »   [go: up one dir, main page]

Skip to content
BY 4.0 license Open Access Published by De Gruyter Open Access July 1, 2020

Criminal Community Detection Based on Isomorphic Subgraph Analytics

  • Theyvaa Sangkaran EMAIL logo , Azween Abdullah and NZ Jhanjhi EMAIL logo
From the journal Open Computer Science

Abstract

All highly centralised enterprises run by criminals do share similar traits, which, if recognised, can help in the criminal investigative process. While conducting a complex confederacy investigation, law enforcement agents should not only identify the key participants but also be able to grasp the nature of the inter-connections between the criminals to understand and determine the modus operandi of an illicit operation. We studied community detection in criminal networks using the graph theory and formally introduced an algorithm that opens a new perspective of community detection compared to the traditional methods used to model the relations between objects. Community structure, generally described as densely connected nodes and similar patterns of links is an important property of complex networks. Our method differs from the traditional method by allowing law enforcement agencies to be able to compare the detected communities and thereby be able to assume a different viewpoint of the criminal network, as presented in the paper we have compared our algorithm to the well-known Girvan-Newman. We consider this method as an alternative or an addition to the traditional community detection methods mentioned earlier, as the proposed algorithm allows, and will assists in, the detection of different patterns and structures of the same community for enforcement agencies and researches. This methodology on community detection has not been extensively researched. Hence, we have identified it as a research gap in this domain and decided to develop a new method of criminal community detection.

References

[1] Cai, Q., Ma, L., Gong, M., & Tian, D., A survey on network community detection based on evolutionary computation. International Journal of Bio-Inspired Computation, Vol. 8(2), pp. 84-98, January, 2016.10.1504/IJBIC.2016.076329Search in Google Scholar

[2] Lim, M., Abdullah, A., Jhanjhi, N., Khan, M. K., & Supramaniam, M. (2019). Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique. IEEE Access, 7, 184797-184807.10.1109/ACCESS.2019.2958873Search in Google Scholar

[3] Zhang, Chi, and Osmar R. Zaïane., Detecting local communities in networks with edge uncertainty, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Barcelona, Spain, 2018. pp. 9-16.10.1109/ASONAM.2018.8508543Search in Google Scholar

[4] Sangkaran, T., Abdullah, A., Jhanjhi, NZ., & Supramaniam, M., Survey on isomorphic graph algorithms for graph analytics, International Journal of Computer Science and Network Security, Vol 19(1), pp. 85-92, January, 2019.Search in Google Scholar

[5] Ullmann, J. R., An algorithm for subgraph isomorphism. Journal of the Association for Computer Machinery, Vol 23(1), pp.31-42, January, 1976.10.1145/321921.321925Search in Google Scholar

[6] Cordella, L. P., Foggia, P., Sansone, C., & Vento, M. Performance evaluation of the VF graph matching algorithm. IEEE Proceedings 10th International Conference on Image Analysis and Processing, Venice, Italy, pp. 1172-1177, September, 1999.Search in Google Scholar

[7] Cordella, L. P., Foggia, P., Sansone, C., & Vento, M.. A (sub) graph isomorphism algorithm for matching large graphs, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 26(10), pp. 1367-1372, August 2004.Search in Google Scholar

[8] Schmidt, D. C., & Druffel, L. E., A fast backtracking algorithm to test directed graphs for isomorphism using distance matrices, Journal of the Association for Computer Machinery, Vol 23(3), pp. 433-445. July, 197610.1145/321958.321963Search in Google Scholar

[9] Corneil, D. G., & Gotlieb, C. C., An eflcient algorithm for graph isomorphism, Journal of the Association for Computer Machinery, Vol 17(1), pp.51-64, January, 197010.1145/321556.321562Search in Google Scholar

[10] Fu, L., & Chandra, S., Optimized backtracking for subgraph isomorphism. International Journal of Database Management Systems, Vol 4(6), pp. 1. December, 2012.10.5121/ijdms.2012.4601Search in Google Scholar

[11] Javed, M. A., Younis, M. S., Latif, S., Qadir, J., & Baig, A., Community detection in networks: A multidisciplinary review. Journal of Network and Computer Applications, Vol 108, pp. 87-111, April, 2018.10.1016/j.jnca.2018.02.011Search in Google Scholar

[12] Lim, M., Abdullah, A., & Jhanjhi, N. Z. (2019). Performance optimization of criminal network hidden link prediction model with deep reinforcement learning. Journal of King Saud University-Computer and Information Sciences.Search in Google Scholar

[13] M. Lim, A. Abdullah, NZ. Jhanjhi and M. K. Khan, " A Deep Reinforcement Learning Data Fusion model for Time-evolving Criminal Network Link Prediction," in IEEE Access. doi: 10.1109/ACCESS.2019.2958873, 2020.10.1109/ACCESS.2019.2958873Search in Google Scholar

[14] Li, J., Lear, M. J., Kawamoto, Y., Umemiya, S., Wong, A. R., Kwon, E., ... & Hayashi, Y. Oxidative amidation of nitroalkanes with amine nucleophiles using molecular oxygen and iodine. Angewandte Chemie International Edition, Vol 54(44), pp. 12986-12990, October, 2015.Search in Google Scholar

[15] Newman, M. E., Community detection in networks: Modularity optimization and maximum likelihood are equivalent. arXiv preprint arXiv:1606.02319, June, 2016.Search in Google Scholar

[16] Hu, R., Andreas, J., Rohrbach, M., Darrell, T., & Saenko, K. Learning to reason: End-to-end module networks for visual question answering. IEEE International Conference on Computer Vision, Venice, Italy, 2017, pp. 804-813.10.1109/ICCV.2017.93Search in Google Scholar

[17] Newman, M. E., & Reinert, G., Estimating the number of communities in a network, Physical Review Letters, Vol. 117(7), pp. 078301, August, 2016.Search in Google Scholar

[18] Krzakala, F., Moore, C., Mossel, E., Neeman, J., Sly, A., Zdeborová, L., & Zhang, P., Spectral redemption in clustering sparse networks, Proceedings of the National Academy of Sciences, Vol.110(52), pp.20935-20940, December, 2013.Search in Google Scholar

[19] Liu, C., & Liu, Q., Community detection based on differential evolution using modularity density, Information 9, Vol (9), pp. 218, September, 2018.10.3390/info9090218Search in Google Scholar

[20] Magalingam, P., Davis, S., & Rao, A., Using shortest path to discover criminal community, Digital Investigation, Vol. 15, pp. 1-17, December, 2015.10.1016/j.diin.2015.08.002Search in Google Scholar

[21] Bahulkar, A., Szymanski, B. K., Baycik, N. O., & Sharkey, T. C., Community detection with edge augmentation in criminal networks, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Barcelona, Spain,2018, pp. 1168-1175.10.1109/ASONAM.2018.8508326Search in Google Scholar

[22] Calderoni, F., & Piccardi, C., Uncovering the structure of criminal organizations by community analysis: The infinito network, Tenth International Conference on Signal-Image Technology and Internet-Based Systems, Marrakech, Morocco, 2014, pp. 301-30810.1109/SITIS.2014.20Search in Google Scholar

[23] Carletti, V., Foggia, P., Saggese, A., & Vento, M., Challenging the time complexity of exact subgraph isomorphism for huge and dense graphs with VF3, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 40(4), pp. 804-818, November, 2014.10.1109/TPAMI.2017.2696940Search in Google Scholar PubMed

[24] Omidvar, M. N., Li, X., Mei, Y., & Yao, X. Cooperative co-evolution with differential grouping for large scale optimization. IEEE Transactions on Evolutionary Computation, Vol 18(3), pp. 378-393, September, 2013.10.1109/TEVC.2013.2281543Search in Google Scholar

[25] Huang, Q., White, T., Jia, G., Musolesi, M., Turan, N., Tang, K., & Yao, X., Community detection using cooperative co-evolutionary differential evolution, 2012 International Conference on Parallel Problem Solving from Nature, Berlin, Germany, pp. 235-24410.1007/978-3-642-32964-7_24Search in Google Scholar

[26] McKay, B. D., & Piperno, A., Practical graph isomorphism, II. Journal of Symbolic Computation, Vol. 60, pp. 94-112, January, 2014.10.1016/j.jsc.2013.09.003Search in Google Scholar

[27] Dado, M., & Bodemer, D. A review of methodological applications of social network analysis in computer-supported collaborative learning. Educational Research Review, Vol.22, pp. 159-180.10.1016/j.edurev.2017.08.005Search in Google Scholar

[28] Farine, Damien. The dynamics of transmission and the dynamics of networks. Journal of Animal Ecology 86, Vol.3, pp.415-418. May 201710.1111/1365-2656.12659Search in Google Scholar PubMed

[29] Lim, M., Abdullah, A., Jhanjhi, NZ., & Supramaniam, M., Hidden Link Prediction in Criminal Networks Using the Deep Reinforcement Learning Technique. Computers, Vol 8(1), pp 8, March, 201710.3390/computers8010008Search in Google Scholar

[30] Sangkaran, Theyvaa, Azween Abdullah, and N. Z. JhanJhi. "Criminal Network Community Detection Using Graphical Analytic Methods: A Survey." doi: 10.4108/eai.13-7-2018.16269010.4108/eai.13-7-2018.162690Search in Google Scholar

[31] Ozgul, F., Erdem, Z., Bowerman, C., & Bondy, J. (2010, June). Combined detection model for criminal network detection. In Pacific-Asia Workshop on Intelligence and Security Informatics (pp. 1-14). Springer, Berlin, Heidelberg.10.1007/978-3-642-13601-6_1Search in Google Scholar

[32] Ozgul, F., Gok, M., Erdem, Z., & Ozal, Y. (2012, June). Detecting criminal networks: SNA models are compared to proprietary models. In 2012 IEEE International Conference on Intelligence and Security Informatics (pp. 156-158). IEEE.10.1109/ISI.2012.6284278Search in Google Scholar

[33] Nowé, A., Vrancx, P., & De Hauwere, Y. M. (2012). Game theory and multi-agent reinforcement learning. In Reinforcement Learning (pp. 441-470). Springer, Berlin, Heidelberg.10.1007/978-3-642-27645-3_14Search in Google Scholar

[34] Barbosa, S. E., & Petty, M. D. (2014). Reinforcement learning in an environment synthetically augmented with digital pheromones. Advances in Artificial Intelligence, 2014.10.1155/2014/932485Search in Google Scholar

Received: 2019-12-15
Accepted: 2020-03-29
Published Online: 2020-07-01

© 2020 Theyvaa Sangkaran et al., published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 3.10.2024 from https://www.degruyter.com/document/doi/10.1515/comp-2020-0112/html
Scroll to top button