0% found this document useful (0 votes)
52 views

Analysis & Visualization of Terrorist Networks: Professor Dr. M. Akram Shaikh

This document analyzes and visualizes terrorist networks through network analysis techniques. Two case studies are presented on terrorist networks involved in bombings in East Africa and the September 11 attacks. Centrality measures are calculated to identify key individuals and determine how removing them could destabilize the networks.

Uploaded by

Neelam Shah
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Analysis & Visualization of Terrorist Networks: Professor Dr. M. Akram Shaikh

This document analyzes and visualizes terrorist networks through network analysis techniques. Two case studies are presented on terrorist networks involved in bombings in East Africa and the September 11 attacks. Centrality measures are calculated to identify key individuals and determine how removing them could destabilize the networks.

Uploaded by

Neelam Shah
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 12

ANALYSIS & VISUALIZATION OF TERRORIST NETWORKS

By:
Aqsa Yousif (Group Leader) Ameet Kumar Masroor Ahmed Tu io !ira Kha"id A"taf Ahsa Kho$a%a 07SW80 07SW42 07SW70 07SW#2 07SW40

Supervised By:
Professor Dr. M. Akram S a!k
DEPARTMENT OF SOFTWARE EN"INEERIN" ME#RAN UNIVERSITY OF EN"INEERIN" & TE$#NOLO"Y% &AMS#ORO

Su&mitted i partia" fu"fi""me t of the requireme ts for the de'ree of (a)he"or of Soft$are * 'i eeri '
&a'(ar)% *+,, i

ii

Dedication
To our Beloved and Respected

Parents & Teachers


iii

$ERTIFI$ATE
This is to )ertif+ that the $or, prese ted i this thesis tit"ed -A a"+sis . /isua"i0atio of Terrorist 1et$or,s2 is e tire"+ a a"+0ed a d demo strate &+ the fo""o$i ' stude ts themse"3es4

Aqsa Yousuf (Group Leader) Masroor Ahmed Tu io !ira Kha"id Amit Kumar A"taf Ahsa Kho$a%a

07SW80 07SW70 07SW#2 07SW42 07SW40

55555555555555555555555555 555555555555555555555555555555 6rof4 7r4M4A,ram Shai,h4 6rof4 Tahsee !afi0 (Super3isor) 8hairma Soft$are * 'i eeri ' 7epartme t

7ate9 555555555555555555555555

7ate9 5555555555555555555555555

i3

A$KNOWLED"EMENT
:or the su))essfu" )omp"etio of our thesis tit"ed -A a"+sis . /isua"i0atio of Terrorist 1et$or,s2 $e pa+ ear"iest 'ratitude to the ALM;G!TY ALLA!< The Most mer)ifu" for 'i3i ' us su)h e er'ies a d de3otio to ma,e this happe 4 We pa+ utmost re'ards to our pare ts for up&ri 'i ' us to )omp"ete a d es)a"ate to the astou di ' a)hie3eme ts )o )er i ' e3er+ aspe)t of our "ife4 We pa+ esteemed tha ,s to our thesis super3isor Prof. Dr. M. Akram S a!k rea)hed its )omp"etio 4 We are Tha ,fu" to the V!-e $ a'-e..or Mehra =*T< Prof. Dr A./.K RA&PUT W#OSE d+ ami) "eadership has made M=*T a "eadi ' = i3ersit+ of 6a,ista 4 We are tha ,fu" to PROF. DR. A. K. 0ALO$#% 7ea :a)u"t+ of *"e)tri)a"< *"e)tro i)s a d 8omputer * 'i eeri '4 We $ou"d "i,e to e>press our profou d se se of 'ratitude to the Prof. Ta see' #af!1 8hairma Soft$are 7epartme t< Mehra = i3ersit+ ?f * 'i eeri ' . Te)h o"o'+< @amshoro4 We a"so pa+ a "ot of tha ,s to our se ior tea)hers Prof. Dr. M(k 2!ar A.! U'ar% Mr. Za !3 S a!k % Mr. L!a4(a2 A.! T e5o% Mr. Na6ee3 A me3 &afr!% &e)ause of their guidance $e $ere a&"e to ma,e it up to the mar,4 Special thanks to: E'7r. /as!m A.! Ara!' E'7r. D!' M( amme3 E'7r. Aree8 Fa2ema E'7r. Sa.a (3!' Sa33ar E'7r. Isma Fara for his ,i d

appraisa" to us< pro3idi ' us $ith adequate resour)es< a d $ithout him thesis )ou"d ot ha3e

:or their Support A d Co-operation.

Si )ere Ae'ards to Li&raria a d a"" other Staff Mem&ers o &oard for 'i3i ' us their pre)ious time a d ad3i)es )o )er i ' our pro&"ems duri ' the pro%e)t4

A0STRA$T
Terrorist 1et$or, A a"+sis is the s)ie )e of usi ' et$or, theor+ to )o stru)t< 3ie$ a d a a"+0e terrorist et$or,s that are 'raphed a"o ' their )o e)tio s4 The )o3ert< se)ret or i""e'a" et$or,s that are a"so termed as o B)ooperati3e or'a i0atio s are a a"+0ed usi ' 8e tra"it+ Measures4 The most )ommo "+ used -8e tra"it+ Measures2 are of four t+pes 7e'ree< (et$ee ess< 8"ose ess a d *i'e /e)tor 8e tra"it+ C that ma,es a"" 3isi&"e to us that )a ot &e see &+ our a,ed e+e a d he"p i desta&i"i0i ' a )o3ert et$or,4 The )e tra"it+ measures a s$ers the questio s su)h as9 $ho are "eaders< 'ate,eepers (&ro,ers)< out"iers< a d fo""o$ers from the et$or,4 ; this thesis $or, t$o )ase studies are prese ted o the terrorist re"atio of the t$o terrorist 'roups that $ere i 3o"3ed i t$o differe t operatio s as i #DD8 simu"ta eous &om&i 's at =4S4 *m&assies i the ma%or *ast Afri)a )ities of 7ar es Sa"aam< Ta 0a ia< 1airo&i< Ke +a a d the Septem&er ## atta),s (ofte referred to as Septem&er ##th or DE##)4 These datasets sho$s us the )hief "eader i &oth su& 'roups $ho has "i ,s $ith a"" the others so if the )hief perso remo3ed that )a easi"+ desta&i"i0e the et$or,4

3i

Des-r!92!o'
7*7;8AT;?1FFFFFFFFFF444FFFFFFFFFFFFFFF4 FFFFF44;;; 8*AT;:;8AT*FFFFFFFFF444FFFFFFFFFFFFFFFFFFFFF444;/ A8K1?WL*7G*M*1T4FFFF444FFFFFFFFFFFFFFFF44444444444444444444444444/ A(STAA8TFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF44/; L;ST ?: TA(L*SFFF4FFFFFFFFFFFFFFFFFFFFF4444444444444444444444444G L;ST ?: :;G=A*SFFFFFFFFFFFFFFFFFFFFFFFFFFFFF444G;

TA0LE OF $ONTENTS
$#APTER +, INTRODU$TION.:::::::::::::::::::::::, #4# ?3er3ie$FFFFFFFFFFFFFFFFFFFFFF4# 8e""u"ar 1et$or,sFFFFFFFFF444444444444444444444444444444442 Ge e Ae'u"ar 1et$or,sFFFFFFFFFFFFFF442 8omputer 1et$or,s FFFFFFFFFFFFFFF4444H Lo'isti)a" 1et$or,s FFFFFFFFFFFFFFF4444H 8o3ert 1et$or,sFFFFFFFFFFFFFFFFFF4444H 1et$or, Stur)ture Mi i '4444444FFFFFFFFFFFFF4444 K o$"ed'e dis)o3er+ i data&ases F4FF44FFFFFFFF44 Ao"e Stru)ture mi i 'FFFFFFFFF4FFFFF444444444J #4I4# #4J 24# Ad3a ta'es of effe)ti3e ro"e mi i 'FFFFFFFFF4J #4#4# #4#42 #4#4H #4#44 #42 #4H #44 #4I

Ae"ated Wor,FFFFFFFFFFFFFFFFFFFF444J ?3er3ie$FFFFFFFFFFFFFFFFFFFFFF448 3ii

$#APTER +* NETWORK ANALYSIS AND VISUALIZATION :::::::::..;

24#4# 24#42 242 24H 244 H4# 2424#

1et$or, A a"+sisFFFFFFFFFFFFFFFF4448 (a),'rou d of 1et$or, A a"+sisFFFFFF4FFFF448 A a"+sis !ere See,s ToFFFFFFFFFFFFFF#0

8rimi a" 1et$or, A a"+sisFFFFFFFFFFFFFFF4D 8ha""e 'es ; 7ata 6ro)essi ' ?f 8rimi a" 1et$or,FFFF#0 Metri)s (Measures) ; 1et$or, A a"+sisFFFF4FFFF44#H ?3er3ie$FFFFFFFFFFFFFFFFFFFFFF#J H4#4# :irst Ge eratio FFFFFFFFFFFFFFFF4#7 Se)o d Ge eratio FFFFFFFFFFFFFFF4#8 Third Ge eratio FFFFFFFFFFFFFFFF#D 8ommetri>FFFFFFFFFFFFFFFFFF420 ;'raphFFFFFFFFFFFFFFFFFFFF422 @=1GFFFFFFFFFFFFFFFFFFFF424 1etMi erFFFFFFFFFFFFFFFFFFF2I Guess FFFFFFFFFFFFFFFFFFFF2J =8;1*T FFFFFFFFFFFFFFFFFF44427

$#APTER +< TOOLS AND TE$#NOLO"IES...::::::::..................................,=

H4#42 H4#4H H42 H424# H4242 H424H H4244 H424 I H424 J 44# 442 44H

7es)riptio of Most 8ommo Too"s =sedFFFFFFFFF20

$#APTER +> UNDERSTANDIN" T#E DATASET:::::::::.........................*? ?3er3ie$FFFFFFFFFFFFFFFFFFFFFF2D Tas, to &e a))omp"ishedFFFFFFFFFFFFFFFF2D To ;de tif+ the Ke+ *"eme tF44444444444444444444444444444444444444444444444444H0 6repare 7ata :or ;mporti ' To =)i etFFFFFFF44H# 8op+ the 7ata to MS WordFFFFFFFFFFF444H2 Ta&"e to te>tFFFFFFFFFFFFFFFFF444HH Getti ' Aid ?f 8ommasFFFFFFFFFFFFFH4 Sa3i ' as =8;1*T fi"eFFFFFFFFFFFFF44H4

444 The 6ro)edure for )reati ' datasetFFFFFFFFFFFFH# 4444# 44442 4444H 44444 4444I 44I I4#

Aead the 7ata i to =8;1*TFFFFFFFFFFFFFF44HI ?3er3ie$FFFFFFFFFFFFFFFFFFFFF4444H7 3iii

$#APTER @ TERRORIST NETWORK ANALYSIS:::::::::::::::.<A

I42 I4H

Ae"ated Wor,FFFFFFFFFFFFFFFFFFF44H7 *>perime tsFFFFFFFFFFFFFFFFFFF444HD 8AS* ST=7Y #FFFFFFFFFFFFFFF444444HD A a"+0e the e tire et$or,FFFFFFFFFFF40 /isua"i0atio FFFFFFFFFFFFFFFFF4H A a"+0e the e tire et$or,FFFFFFFFFFF4440 /isua"i0atio FFFFFFFFFFFFFFFFF4H I4H4#4# I4H4H42

I4H4#

I4H42

8AS* ST=7Y 2FFFFFFFFFFFFFFFFF444D

I4H424# I4H4242 I44

8o )"usio FFFFFFFFFFFFFFFFFFFF444ID

$#APTER = $ON$LUSION :::::::::::::::::::::::::=* REFEREN$ES:::::::::::::::::::::::::::::::=>

i>

LIST OF TA0LES
Ta5.e @.,: 8e tra"it+ Measures 8a")u"ated for Su& GraphsFFFFFFFFF444 48 Ta5.e @.*: 8e tra"it+ Measures 8a")u"ated for Su& GraphsFFFFFFFFF444 I8 Ta5.e @.<: 7iffere t ro"es su''ested &+ ro"e stru)tura" mi i 'FFFFFFFF444J0 Ta5.e @.>: 7iffere t ro"es su''ested &+ ro"e stru)tura" mi i 'FFFFFFFF444J#

>

LIST OF FI"URES

F!7(re ,.,: 7iffere t et$or,s FFFFFFFFFFFFFFFFFFFFF # F!7(re <.,: The terrorist et$or, )o tai i ' the #D hi%a),ers4FFFFFFF4FF#7 F!7(re <.*: Se)o d Ge eratio )rimi a" et$or, a a"+sis a d 3isua"i0atio too"s44444#8 F!7(re <.<: ;7* of 8ommetri>FFFFFFFF444FFFFFFFFFFFF2# F!7(re <.>: ;7* of ;GraphFFFFFFFFFFFFFFFFFFFFFF42H F!7(re <.@: @=1G A6; em&edded i *)"ipseFFFFFFFFFFFFFFF424 F!7(re <.=: ;7* of 1et Mi erFFFFFFFFFFFFFFFFFFFFF2I F!7(re <.A: ;7* of G=*SSFFFFFFFFFFFFFFFFFFFFFF27 F!7(re >.,: 7ata i Wor,sheet ; MSB*G8*L FFFFFFFFFFFFFF4H0 F!7(re >.*: 7ata 8opied to MsBWord FFFFFFFFFFFFFFFFFFH# F!7(re >.<: 8o 3erti ' Ta&"e to te>t FFFFFFFFFFFFFFFFFF4 H2 F!7(re >.>: 8o 3erti ' Ta&"e to te>t dia"o' FFFFFFFFFFFFFFF44 H2 F!7(re >.@: Aep"a)i ' )omma to spa)e FFFFFFFFFFFFFFFFF4 HH F!7(re >.=: Sa3i ' fi"e as 47L =8;1*T fi"e FFFFFFFFFFFFFFF4 H4 F!7(re >.A: ;mporti ' te>t fi"e i d" format FFFFFFFFFFFFFFF444 HI F!7(re >.;: 7efau"t so)io'ram FFFFFFFFFFFFFFFFFFFF444HJ F!7(re >.?: * er'i0ed so)io'ram FFFFFFFFFFFFFFFFFFF44 HJ F!7(re @.,: 1ode importa )e $ith respe)t to )e tra"it+ measures from S1A FF444HD F!7(re @.*: 1et$or, 7e sit+ FFFFFFFFFFFFFFFFFFFFF440 F!7(re @.<: ;so"ates 7roppedFFFFFFFFFFFFFFFFFFFFF444# F!7(re @.>: 8ompo e t outputFFFFFFFFFFFFFFFFFFFF444442 F!7(re @.@: 7e'ree 8e tra"it+FFFFFFFFFFFFFFFFFFFFF442 F!7(re @.=: Spri ' /isua"i0e Graph444FFFFFFFFFFFFFFFFFF44H F!7(re @.A: 7e'ree of 1et$or,FFFFFFFFFFFFFFFFFFFF4 44 F!7(re @.;: (et$ee ess of 1et$or, 444FFFFFFFFFFFFFFFFF44I F!7(re @.?: 8"ose ess of 1et$or, FFFFFFFFFFFFFFFFFFF44J F!7(re @.,*: *i'e /e)tor 8e tra"it+ of 1et$or,FFFFFFFFFFFFF4447 >i

F!7(re @.,,: /isua"i0e 1et$or, of *m&ass+ 7ataset44444444444444444444444444444444444444FF44444D F!7(re @.,*: 1et$or, 7e sit+ FFFFFFFFFFFFFFFFFFFFF4I0 F!7(re @.,<: ;so"ates 7roppedFFFFFFFFFFFFFFFFFFFFF44I# F!7(re @.,>: 8ompo e t outputFFFFFFFFFFFFFFFFFFFF4444I2 F!7(re @.,@: 7e'ree 8e tra"it+FFFFFFFFFFFFFFFFFFFFF4I2 F!7(re @.,=: Spri ' /isua"i0e Graph of em&ass+ 1et$or,FFFFFFFFFF4IH F!7(re @.,A: 7e'ree of 1et$or,FFFFFFFFFFFFFFFFFFFF4 I4 F!7(re @.,;: (et$ee ess of 1et$or, 444FFFFFFFFFFFFFFFFF4II F!7(re @.,?: 8"ose ess of 1et$or, FFFFFFFFFFFFFFFFFFF4IJ F!7(re @.*+: *i'e /e)tor 8e tra"it+ of 1et$or,FFFFFFFFFFFFF44I7

>ii

You might also like