skip to main content
research-article

Topic-based social network analysis for virtual communities of interests in the dark web

Published: 31 March 2011 Publication History

Abstract

The study of extremist groups and their interaction is a crucial task in order to maintain homeland security and peace. Tools such as social networks analysis and text mining have contributed to their understanding in order to develop counter-terrorism applications. This work addresses the topic-based community key-members extraction problem, for which our method combines both text mining and social network analysis techniques. This is achieved by first applying latent Dirichlet allocation to build two topic-based social networks in online forums: one social network oriented towards the thread creator point-of-view, and the other is oriented towards the repliers of the overall forum. Then, by using different network analysis measures, topic-based key members are evaluated using as benchmark a social network built a plain representation of the network of posts. Experiments were successfully performed using an English language based forum available in the Dark Web portal.

References

[1]
A. Abbasi and H. Chen. Applying authorship analysis to extremist-group web forum messages. IEEE Intelligent Systems, 20(5):67--75, 2005.
[2]
A. Abbasi, H. Chen, and A. Salem. Sentiment analysis in multiple languages: Feature selection for opinion classification in web forums. ACM Trans. Inf. Syst., 26(3):1--34, 2008.
[3]
D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation. The Journal of Machine Learning . . . , Jan 2003.
[4]
A. Bourhis, L. Dubé, and R. Jacob. . . . The success of virtual communities of practice: The leadership factor. The Electronic Journal of Knowledge . . . , Jan 2005.
[5]
R. B. Bradford. Application of latent semantic indexing in generating graphs of terrorist networks. pages 674--675, 2006.
[6]
L. C. Freeman. Centrality in social networks conceptual clarification. Social Networks, 1(3):215--239, 1978.
[7]
W. Kim, O.-R. Jeong, and S.-W. Lee. On social web sites. Information Systems, 35(2):215--236, 2010.
[8]
J. M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604--632, 1999.
[9]
M. Kosonen. Knowledge sharing in virtual communities -- a review of the empirical research. Int. J. Web Based Communities, 5(2):144--163, 2009.
[10]
H. Kwak, Y. Choi, Y.-H. Eom, H. Jeong, and S. Moon. Mining communities in networks: a solution for consistency and its evaluation. pages 301--314, 2009.
[11]
A. McCallum, X. Wang, and A. Corrada-Emmanuel. Topic and role discovery in social networks with experiments on enron and academic email. Journal of Artificial . . . , Jan 2007.
[12]
R. D. Nolker and L. Zhou. Social computing and weighting to identify member roles in online communities. Web Intelligence, IEEE / WIC / ACM International Conference on, 0:87--93, 2005.
[13]
N. Pathak, C. Delong, A. Banerjee, and K. Erickson. Social topic models for community extraction. Aug 2008.
[14]
U. Pfeil and P. Zaphiris. Investigating social network patterns within an empathic online community for older people. Computers in Human Behavior, 25(5):1139--1155, 2009.
[15]
X. H. Phang and C. Nguyen. Gibbslda++, 2008.
[16]
C. E. Porter. A typology of virtual communities: A multi-disciplinary foundation for future research. Journal of Computer-Mediated Communication, 10(1):00, 2004.
[17]
G. Probst and S. Borzillo. Why communities of practice succeed and why they fail. European Management Journal, 26(5):335--347, 2008.
[18]
E. Reid, J. Qin, Y. Zhou, G. Lai, M. Sageman, G. Weimann, and H. Chen. Collecting and analyzing the presence of terrorists on the web: A case study of jihad websites. pages 402--411, 2005.
[19]
S. A. Ríos, F. Aguilera, and L. Guerrero. Virtual communities of practice's purpose evolution analysis using a concept-based mining approach. Knowledge-Based and Intelligent Information and Engineering Systems, 2:480--489, 2009.
[20]
M. Sageman. A strategy for fighting international islamist terrorists. ANNALS of the American Academy of Political and Social Science, 618(1):223--231, 2008.
[21]
G. Salton, A. Wong, and C. S. Yang. A vector space model for automatic indexing. Commun. ACM, Vol. 18(11):613--620, 1975.
[22]
S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. 1994.
[23]
D. Xing and M. Girolami. Employing latent dirichlet allocation for fraud detection in telecommunications. Pattern Recognition Letters, Vol. 28(13):1727--1734, 2007.
[24]
J. Xu and H. Chen. Crimenet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems (TOIS), Jan 2005. Aqui sale bien el blockmodeling.
[25]
J. Xu and H. Chen. The topology of dark networks. Commun. ACM, 51(10):58--65, 2008.
[26]
L. Yang, F. Liu, J. Kizza, and R. Ege. Discovering topics from dark websites. In CICS '09: IEEE Symposium on Computational Intelligence in Cyber Security., pages 175--179. IEEE, 2009.
[27]
L. Yang, F. Liu, J. Kizza, and R. Ege. Discovering topics from dark websites. Computational Intelligence in Cyber Security, 2009. CICS '09. IEEE Symposium on, pages 175--179, 2009.
[28]
Y. Zhang, S. Zeng, L. Fan, Y. Dang, C. A. Larson, and H. Chen. Dark web forums portal: searching and analyzing jihadist forums. pages 71--76, 2009.
[29]
Y. Zhou, E. Reid, J. Qin, H. Chen, and G. Lai. Us domestic extremist groups on the web: Link and content analysis. IEEE Intelligent Systems, 20(5):44--51, 2005.

Cited By

View all
  • (2024)Social Network Analysis: A Survey on Process, Tools, and ApplicationACM Computing Surveys10.1145/364847056:8(1-39)Online publication date: 10-Apr-2024
  • (2024)Content and link Analysis of a Moroccan entrepreneurs group2024 International Conference on Intelligent Systems and Computer Vision (ISCV)10.1109/ISCV60512.2024.10620109(1-8)Online publication date: 8-May-2024
  • (2024)Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling WeightIEEE Access10.1109/ACCESS.2023.334773712(36361-36371)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Topic-based social network analysis for virtual communities of interests in the dark web

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM SIGKDD Explorations Newsletter
      ACM SIGKDD Explorations Newsletter  Volume 12, Issue 2
      December 2010
      98 pages
      ISSN:1931-0145
      EISSN:1931-0153
      DOI:10.1145/1964897
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 March 2011
      Published in SIGKDD Volume 12, Issue 2

      Check for updates

      Author Tags

      1. dark web
      2. latent dirichlet allocation
      3. social network analysis
      4. terrorism Informatics
      5. terrorism knowledge portals
      6. text mining
      7. virtual communities of interest

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)72
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 15 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Social Network Analysis: A Survey on Process, Tools, and ApplicationACM Computing Surveys10.1145/364847056:8(1-39)Online publication date: 10-Apr-2024
      • (2024)Content and link Analysis of a Moroccan entrepreneurs group2024 International Conference on Intelligent Systems and Computer Vision (ISCV)10.1109/ISCV60512.2024.10620109(1-8)Online publication date: 8-May-2024
      • (2024)Dark Side of the Web: Dark Web Classification Based on TextCNN and Topic Modeling WeightIEEE Access10.1109/ACCESS.2023.334773712(36361-36371)Online publication date: 2024
      • (2024)Missing the mark? Identifying child sexual abuse material forum structure and key-players based on public replies and private messaging networksHumanities and Social Sciences Communications10.1057/s41599-024-03954-x11:1Online publication date: 2-Nov-2024
      • (2024)Prompt-Based Learning for Thread Structure Prediction in Cybersecurity ForumsIntelligent Systems and Applications10.1007/978-3-031-47715-7_51(766-781)Online publication date: 30-Jan-2024
      • (2023)Towards Safe Cyber Practices: Developing a Proactive Cyber-Threat Intelligence System for Dark Web Forum Content by Identifying CybercrimesInformation10.3390/info1406034914:6(349)Online publication date: 18-Jun-2023
      • (2023)Computational techniques to counter terrorism: a systematic surveyMultimedia Tools and Applications10.1007/s11042-023-15545-083:1(1189-1214)Online publication date: 3-Jun-2023
      • (2022)Understanding Dark Web: A Systematic Literature Review2022 International Conference on Cyber Resilience (ICCR)10.1109/ICCR56254.2022.9995741(1-10)Online publication date: 6-Oct-2022
      • (2022)The Anonymity of the Dark Web: A SurveyIEEE Access10.1109/ACCESS.2022.316154710(33628-33660)Online publication date: 2022
      • (2022)Neuro-semantic prediction of user decisions to contribute content to online social networksNeural Computing and Applications10.1007/s00521-022-07307-034:19(16717-16738)Online publication date: 1-Oct-2022
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media