Skip to main content

Graph Comparison and Artificial Models for Simulating Real Criminal Networks

  • Conference paper
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 944))

Abstract

Network Science is an active research field, with numerous applications in areas like computer science, economics, or sociology. Criminal networks, in particular, possess specific topologies which allow them to exhibit strong resilience to disruption. Starting from a dataset related to meetings between members of a Mafia organization which operated in Sicily during 2000s, we here aim to create artificial models with similar properties. To this end, we use specific tools of Social Network Analysis, including network models (Barabási-Albert identified to be the most promising) and metrics which allow us to quantify the similarity between two networks. To the best of our knowledge, the DeltaCon and spectral distances have never been applied in this context. The construction of artificial, but realistic models can be a very useful tool for Law Enforcement Agencies, who could reconstruct and simulate the evolution and structure of criminal networks based on the information available.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agreste, S., Catanese, S., De Meo, P., Ferrara, E., Fiumara, G.: Network structure and resilience of Mafia syndicates. Inf. Sci. 351, 30–47 (2016). https://doi.org/10.1016/j.ins.2016.02.027

    Article  Google Scholar 

  2. Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626–688 (2015). https://doi.org/10.1007/s10618-014-0365-y

    Article  MathSciNet  Google Scholar 

  3. Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999). https://doi.org/10.1126/science.286.5439.509

    Article  MathSciNet  MATH  Google Scholar 

  4. Berlusconi, G., Calderoni, F., Parolini, N., Verani, M., Piccardi, C.: Link prediction in criminal networks: a tool for criminal intelligence analysis. PLoS ONE 11(4), 1–21 (2016). https://doi.org/10.1371/journal.pone.0154244

    Article  Google Scholar 

  5. Calderoni, F., Catanese, S., De Meo, P., Ficara, A., Fiumara, G.: Robust link prediction in criminal networks: a case study of the Sicilian Mafia. Expert Syst. Appl. 161, 113–666 (2020). https://doi.org/10.1016/j.eswa.2020.113666

    Article  Google Scholar 

  6. Campana, P.: Explaining criminal networks: strategies and potential pitfalls. Methodological Innov. 9, 205979911562274 (2016). https://doi.org/10.1177/2059799115622748

    Article  Google Scholar 

  7. Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., Liotta, A.: Criminal Network: the Sicilian Mafia. “Montagna Operation" (2020). https://doi.org/10.5281/zenodo.3938818

  8. Cavallaro, L., Ficara, A., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Song, W., Liotta, A.: Disrupting resilient criminal networks through data analysis: the case of Sicilian Mafia. PLoS ONE 15(8), 1–22 (2020). https://doi.org/10.1371/journal.pone.0236476

  9. De Moor, S., Vandeviver, C., Vander Beken, T.: Assessing the missing data problem in criminal network analysis using forensic DNA data. Soc. Netw. 61, 99–106 (2020). https://doi.org/10.1016/j.socnet.2019.09.003

    Article  Google Scholar 

  10. Donnat, C., Holmes, S.: Tracking network dynamics: a survey using graph distances. Ann. Appl. Stat. 12(2), 971–1012 (2018). https://doi.org/10.1214/18-AOAS1176

    Article  MathSciNet  MATH  Google Scholar 

  11. Duijn, P.A.C., Kashirin, V., Sloot, P.M.A.: The relative ineffectiveness of criminal network disruption. Sci. Rep. 4(1), 4238 (2014). https://doi.org/10.1038/srep04238

    Article  Google Scholar 

  12. Emmert-Streib, F., Dehmer, M., Shi, Y.: Fifty years of graph matching, network alignment and network comparison. Inf. Sci. 346–347, 180–197 (2016). https://doi.org/10.1016/j.ins.2016.01.074

    Article  MathSciNet  MATH  Google Scholar 

  13. Erdös, P., Rényi, A.: On random graphs I. Publicationes Mathematicae 6, 290–297 (1959)

    Google Scholar 

  14. Ferrara, E., De Meo, P., Catanese, S., Fiumara, G.: Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 41(13), 5733–5750 (2014). https://doi.org/10.1016/j.eswa.2014.03.024

    Article  Google Scholar 

  15. Ficara, A., Cavallaro, L., De Meo, P., Fiumara, G., Catanese, S., Bagdasar, O., Liotta, A.: Social network analysis of sicilian mafia interconnections. In: Complex Networks and Their Applications VIII, pp. 440–450. Springer International Publishing (2020). https://doi.org/10.1007/978-3-030-36683-4_36

  16. Finckenauer, J.O.: Problems of definition: what is organized crime? Trends Organized Crime 8(3), 63–83 (2005). https://doi.org/10.1007/s12117-005-1038-4

    Article  Google Scholar 

  17. Gambetta, D.: The Sicilian Mafia: The Business of Private Protection. Harvard University Press, Cambridge (1996)

    Google Scholar 

  18. Gilbert, E.N.: Random graphs. Ann. Math. Stat. 30(4), 1141–1144 (1959). https://doi.org/10.1214/aoms/1177706098

    Article  MATH  Google Scholar 

  19. Johnsen, J.W., Franke, K.: Identifying central individuals in organised criminal groups and underground marketplaces. In: Shi, Y., Fu, H., Tian, Y., Krzhizhanovskaya, V.V., Lees, M.H., Dongarra, J., Sloot, P.M.A. (eds.) Computational Science – ICCS 2018, pp. 379–386. Springer International Publishing, Cham (2018). https://doi.org/10.1007/978-3-319-93713-7_31

  20. Kleemans, E.R., de Poot, C.J.: Criminal careers in organized crime and social opportunity structure. Eur. J. Criminol. 5(1), 69–98 (2008). https://doi.org/10.1177/1477370807084225

    Article  Google Scholar 

  21. Koutra, D., Vogelstein, J.T., Faloutsos, C.: DeltaCon: A principled massive-graph similarity function. In: Proceedings of the 2013 SIAM International Conference on Data Mining, pp. 162–170 (2013). https://doi.org/10.1137/1.9781611972832.18

  22. Newman, M.E.J.: Estimating network structure from unreliable measurements. Phys. Rev. E 98, 062321 (2018). https://doi.org/10.1103/PhysRevE.98.062321

    Article  Google Scholar 

  23. Paoli, L.: Mafia brotherhoods: organized crime, Italian style. Oxford University Press, Oxford Scholarship Online (2008). https://doi.org/10.1093/acprof:oso/9780195157246.001.0001

  24. Peixoto, T.P.: Reconstructing networks with unknown and heterogeneous errors. Phys. Rev. X 8, 041011 (2018). https://doi.org/10.1103/PhysRevX.8.041011

    Article  Google Scholar 

  25. Robinson, D., Scogings, C.: The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract". Secur. Inform. 7(1), 2 (2018). https://doi.org/10.1186/s13388-018-0031-9

    Article  Google Scholar 

  26. Rostami, A., Mondani, H.: The complexity of crime network data: a case study of its consequences for crime control and the study of networks. PLoS ONE 10(3), 1–20 (2015). https://doi.org/10.1371/journal.pone.0119309

    Article  Google Scholar 

  27. Soundarajan, S., Eliassi-Rad, T., Gallagher, B.: A guide to selecting a network similarity method. In: Proceedings of the 2014 SIAM International Conference on Data Mining, pp. 1037–1045 (2014). https://doi.org/10.1137/1.9781611973440.118

  28. Squartini, T., Mastrandrea, R., Garlaschelli, D.: Unbiased sampling of network ensembles. New J. Phys. 17(2), 023052 (2015). https://doi.org/10.1088/1367-2630/17/2/023052

    Article  Google Scholar 

  29. Tantardini, M., Ieva, F., Tajoli, L., Piccardi, C.: Comparing methods for comparing networks. Scientific Rep. 9(1), 17557 (2019). https://doi.org/10.1038/s41598-019-53708-y

    Article  Google Scholar 

  30. Villani, S., Mosca, M., Castiello, M.: A virtuous combination of structural and skill analysis to defeat organized crime. Socio-Econ. Plann. Sci. 65(C), 51–65 (2019). https://doi.org/10.1016/j.seps.2018.01.002

    Article  Google Scholar 

  31. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440–442 (1998). https://doi.org/10.1038/30918

    Article  MATH  Google Scholar 

  32. Williams, P.: Transnational criminal networks. Netw. Netwars Future Terror, Crime, Militancy 1382, 61 (2001)

    Google Scholar 

  33. Wills, P., Meyer, F.G.: Metrics for graph comparison: a practitioner’s guide. PLoS ONE 15(2), 1–54 (2020). https://doi.org/10.1371/journal.pone.0228728

    Article  Google Scholar 

  34. Wilson, R.C., Zhu, P.: A study of graph spectra for comparing graphs and trees. Pattern Recogn. 41(9), 2833–2841 (2008). https://doi.org/10.1016/j.patcog.2008.03.011

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lucia Cavallaro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cavallaro, L. et al. (2021). Graph Comparison and Artificial Models for Simulating Real Criminal Networks. In: Benito, R.M., Cherifi, C., Cherifi, H., Moro, E., Rocha, L.M., Sales-Pardo, M. (eds) Complex Networks & Their Applications IX. COMPLEX NETWORKS 2020 2020. Studies in Computational Intelligence, vol 944. Springer, Cham. https://doi.org/10.1007/978-3-030-65351-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65351-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65350-7

  • Online ISBN: 978-3-030-65351-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics