Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks
Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that are used as marketplaces for illegal materials, products and services. The trading of illicit goods drives an underground economy by providin...
Saved in:
| Published in: | Procedia computer science Vol. 108; pp. 2388 - 2392 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
2017
|
| Subjects: | |
| ISSN: | 1877-0509, 1877-0509 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that are used as marketplaces for illegal materials, products and services. The trading of illicit goods drives an underground economy by providing services that facilitate almost any type of cyber crime. The challenge for law enforcement agencies is to know which individuals to focus their efforts on, in order to effectively disrupting the services provided by cyber criminals. This paper present our study to assess graph-based centrality measures’ performance for identifying important individuals within a criminal network. These measures has previously been used on small and structured general social networks. In this study, we are testing the measures on a new dataset that is larger, loosely structured and resembles a network within cyber criminal forums. Our result shows that well established measures have weaknesses when applied to this challenging dataset. |
|---|---|
| AbstractList | Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that are used as marketplaces for illegal materials, products and services. The trading of illicit goods drives an underground economy by providing services that facilitate almost any type of cyber crime. The challenge for law enforcement agencies is to know which individuals to focus their efforts on, in order to effectively disrupting the services provided by cyber criminals. This paper present our study to assess graph-based centrality measures’ performance for identifying important individuals within a criminal network. These measures has previously been used on small and structured general social networks. In this study, we are testing the measures on a new dataset that is larger, loosely structured and resembles a network within cyber criminal forums. Our result shows that well established measures have weaknesses when applied to this challenging dataset. |
| Author | Franke, Katrin Johnsen, Jan William |
| Author_xml | – sequence: 1 givenname: Jan William surname: Johnsen fullname: Johnsen, Jan William email: jan.w.johnsen@ieee.org – sequence: 2 givenname: Katrin surname: Franke fullname: Franke, Katrin email: kyfranke@ieee.org |
| BookMark | eNqFkL1OwzAURi1UJAr0CVj8Agl2HMfxwFBVFJAqGAoDk-U4N5JLGle2A8rbk_4MiAHucu_wnSt95xJNOtcBQjeUpJTQ4naT7rwzIc0IFSnhKRXZGZrSUoiEcCInP-4LNAthQ8ZhZSmpmKL3JehgK9vaOOB17OsBuwavnbG6xc8Qv5z_wPNOt0OwAbsOr5wL0O6zvjex91Djhdtu-84aHe0YOEHhGp03ug0wO-0r9La8f108JquXh6fFfJUYJouYaMNERWXe5HXNSAGlrvOqzJmAvOK0KanUWWZklUPOCsK4LLJGCplVrOC8AM6uEDv-Nd6F4KFRO2-32g-KErUXpDbqIEjtBSnC1ShopOQvyth4KBC9tu0_7N2RhbHWpwWvgrHQGaitBxNV7eyf_DdHgIYL |
| CitedBy_id | crossref_primary_10_1088_1742_6596_978_1_012033 |
| Cites_doi | 10.1080/10691898.2015.11889734 10.1016/0378-8733(91)90008-H 10.1007/s12117-008-9038-9 |
| ContentType | Journal Article |
| Copyright | 2017 The Author(s) |
| Copyright_xml | – notice: 2017 The Author(s) |
| DBID | 6I. AAFTH AAYXX CITATION |
| DOI | 10.1016/j.procs.2017.05.172 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1877-0509 |
| EndPage | 2392 |
| ExternalDocumentID | 10_1016_j_procs_2017_05_172 S1877050917307561 |
| GroupedDBID | --K 0R~ 0SF 1B1 457 5VS 6I. 71M AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQFI AAXUO ABMAC ACGFS ADBBV ADEZE AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ E3Z EBS EJD EP3 FDB FNPLU HZ~ IXB KQ8 M41 M~E NCXOZ O-L O9- OK1 P2P RIG ROL SES SSZ 9DU AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO ADVLN AEUPX AFPUW AIGII AKBMS AKRWK AKYEP CITATION ~HD |
| ID | FETCH-LOGICAL-c396t-ac37b194f4dd306e8ad4b8437e4b51f819a22c9b4e436035962f9792b36556e53 |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000404959000257&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1877-0509 |
| IngestDate | Sat Nov 29 04:09:41 EST 2025 Tue Nov 18 21:44:07 EST 2025 Wed May 17 00:58:04 EDT 2023 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Social network analysis Digital forensics Centrality measures Criminal networks |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c396t-ac37b194f4dd306e8ad4b8437e4b51f819a22c9b4e436035962f9792b36556e53 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.procs.2017.05.172 |
| PageCount | 5 |
| ParticipantIDs | crossref_primary_10_1016_j_procs_2017_05_172 crossref_citationtrail_10_1016_j_procs_2017_05_172 elsevier_sciencedirect_doi_10_1016_j_procs_2017_05_172 |
| PublicationCentury | 2000 |
| PublicationDate | 2017 2017-00-00 |
| PublicationDateYYYYMMDD | 2017-01-01 |
| PublicationDate_xml | – year: 2017 text: 2017 |
| PublicationDecade | 2010 |
| PublicationTitle | Procedia computer science |
| PublicationYear | 2017 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Europol. The internet organised crime threat assessment (iocta). September 2014. Online; accessed December 9, 2016. July 2015. Online; accessed December 9, 2016. Prell (bib0008) 2011 National Crime Agency. Cyber crime assessment 2016. J. Diesner and K. M. Carley. Exploration of Communication Networks from the Enron Email Corpus. Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005, pages 3–14, 2005. Reece Howard. Using social network analysis measures. Choo (bib0001) 2008; 11 J. Hardin, G. Sarkis, and P.C. Urc. Network analysis with the enron email corpus. 10 2014. Sparrow (bib0009) 1991; 13 July 2016. Online; accessed December 9, 2016. Valdis (bib0006) 2002; 7 Valdis (10.1016/j.procs.2017.05.172_bib0006) 2002; 7 Sparrow (10.1016/j.procs.2017.05.172_bib0009) 1991; 13 Choo (10.1016/j.procs.2017.05.172_bib0001) 2008; 11 10.1016/j.procs.2017.05.172_bib0003 10.1016/j.procs.2017.05.172_bib0002 10.1016/j.procs.2017.05.172_bib0007 Prell (10.1016/j.procs.2017.05.172_bib0008) 2011 10.1016/j.procs.2017.05.172_bib0005 10.1016/j.procs.2017.05.172_bib0004 |
| References_xml | – reference: Reece Howard. Using social network analysis measures. – volume: 7 year: 2002 ident: bib0006 article-title: Uncloaking terrorist networks publication-title: First Monday – reference: , July 2015. Online; accessed December 9, 2016. – year: 2011 ident: bib0008 publication-title: Social Network Analysis: History, Theory and Methodology – reference: , September 2014. Online; accessed December 9, 2016. – reference: J. Diesner and K. M. Carley. Exploration of Communication Networks from the Enron Email Corpus. Proceedings of Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005, pages 3–14, 2005. – reference: National Crime Agency. Cyber crime assessment 2016. – volume: 13 start-page: 251 year: 1991 end-page: 274 ident: bib0009 article-title: The application of network analysis to criminal intelligence: An assessment of the prospects publication-title: Social Networks – reference: J. Hardin, G. Sarkis, and P.C. Urc. Network analysis with the enron email corpus. 10 2014. – reference: , July 2016. Online; accessed December 9, 2016. – volume: 11 start-page: 270 year: 2008 end-page: 295 ident: bib0001 article-title: Organised crime groups in cyberspace: a typology publication-title: Trends in Organized Crime – reference: Europol. The internet organised crime threat assessment (iocta). – ident: 10.1016/j.procs.2017.05.172_bib0004 doi: 10.1080/10691898.2015.11889734 – year: 2011 ident: 10.1016/j.procs.2017.05.172_bib0008 – ident: 10.1016/j.procs.2017.05.172_bib0002 – ident: 10.1016/j.procs.2017.05.172_bib0005 – volume: 13 start-page: 251 issue: 3 year: 1991 ident: 10.1016/j.procs.2017.05.172_bib0009 article-title: The application of network analysis to criminal intelligence: An assessment of the prospects publication-title: Social Networks doi: 10.1016/0378-8733(91)90008-H – ident: 10.1016/j.procs.2017.05.172_bib0003 – ident: 10.1016/j.procs.2017.05.172_bib0007 – volume: 11 start-page: 270 issue: 3 year: 2008 ident: 10.1016/j.procs.2017.05.172_bib0001 article-title: Organised crime groups in cyberspace: a typology publication-title: Trends in Organized Crime doi: 10.1007/s12117-008-9038-9 – volume: 7 issue: 4 year: 2002 ident: 10.1016/j.procs.2017.05.172_bib0006 article-title: Uncloaking terrorist networks publication-title: First Monday |
| SSID | ssj0000388917 |
| Score | 2.076302 |
| Snippet | Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 2388 |
| SubjectTerms | Centrality measures Criminal networks Digital forensics Social network analysis |
| Title | Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks |
| URI | https://dx.doi.org/10.1016/j.procs.2017.05.172 |
| Volume | 108 |
| WOSCitedRecordID | wos000404959000257&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center) customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: M~E dateStart: 20100101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LSxxBEG6C5uDFmKj4DH3ITQdm-jE9fRRRJIQlEAN6GqZnekCRWdlR0Yu_PVX92J3Nimggl2G3md5euj6qq4uvviLkm0bVOt02ieGGJULXVaIb5Ijx1tapMCmvXKHwDzUaFRcX-meg2_aunYDquuLxUd_-V1PDGBgbS2ffYe7pj8IAfAajwxPMDs83GR6CukB5fXIswadYlwLGGHnS90CKBJv2jnt7g--ikuw98tHnqkbipH4Yx7r6AoCWo6RjV4iDcJQOGTkhufO96qL4wxQt2CreBjbHJIh_h9yDL7L0qbCFchjnPQulEhSU8YfLC2PR5abF0Gly39kvHMCM--54C87d5xmu8WipUWk9c6KrmW_985dq9i9cF5fNwIUpiRfkZabg9oTszudZGg7FcLTryzz9o1GbyrEAF9Z6OX4ZxCTna2Q1XCbokQfBZ_LBdl_Ip9iogwa_vU4uB5igDhN03FKPCRrMSyMm6LijARN0hgk6h4k4qd8gv09Pzo_PktBTI6m5zu-SqubKZFq0omngtmiLqhGmEFxZYWTWQnxYMVZrI6zgOco75qzVSjPDcylzK_kmWerGnd0iFINXiBbbhrNKaCGNsq3KZVZomeK1e5uwuFNlHQTnse_JTRmZhdel294St7dMZQnbu00Op5Nuvd7K66_n0QRlwLkPBUsAzWsTd_514i5ZwW8-C7dHlsAOdp98rB_urvrJVweuP0pfkww |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Feasibility+Study+of+Social+Network+Analysis+on+Loosely+Structured+Communication+Networks&rft.jtitle=Procedia+computer+science&rft.au=Johnsen%2C+Jan+William&rft.au=Franke%2C+Katrin&rft.date=2017&rft.pub=Elsevier+B.V&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=108&rft.spage=2388&rft.epage=2392&rft_id=info:doi/10.1016%2Fj.procs.2017.05.172&rft.externalDocID=S1877050917307561 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon |