0704-883-0675     |      dataprojectng@gmail.com

DEVELOPMENT OF ENHANCED BAYESIAN MODEL FOR DETECTION OF COVERT MEMBERS IN CRIMINAL NETWORKS USING TELECOMMUNICATION METADATA

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

ABSTRACT

Crime has become a global challenge in recent times. The phenomenon has become a difficult task that military war-fare approach alone can address effectively without intelligence. Criminal intelligence involves gathering data on criminal activities and participants for preparing deplorable strategies and interventions. Social Network Analysis (SNA) offers supportive tools for analysing Organised Criminal Groups (OCGs) and identifying important nodes with conspicuous relationship as its priority. SNA-based techniques arrived at key players in criminal network with nodes that have high SNA metric values. Apart from datasets challenge, SNA is a weak scheme for key players in OCGs because conspicuous links raise susceptibility of vibrant participants while silent key actors are concealed. Also, status of key actors in OCGs are unrelated with SNA metrics. Scatter-graph of vulnerability and strategic positions was devised to mitigate unrelatedness of SNA metrics for detection of key players in Criminal Social Network (CSN). The scheme identifies actors that have both high vulnerability and high strategic position values at the same time. This is synonymous to Influence Maximization (IM) – set of nodes that have high influence. Silent key players or legitimate actors in adversary network still remain unresolved. Missing node concept works towards set of nodes not known initially as part of a social criminal group. It has high affinity for well-connected nodes than marginal nodes. Node discovery scheme unravels latent structure behind key players within CSN. The scheme pinched on multiple sources of data about a criminal group yet legitimate actor are not captured. Inference approach offers probability-based prediction for detecting covert nodes yet only well-connected nodes with conspicuous relationships are still identifiable. The development of Enhanced Bayesian Model aimed at predicting key players like financial aiders and ammunition suppliers with evasive attitudes. It was conceived towards inherent problem of erratic behaviour and structural equivalence abating key-players from theoretical graph-based. Bayesian model and Recursive Bayesian Filter (RBF) algorithm were combined to have Enhanced Bayesian Network Model (EnBNM) with RBF to lower error rate and improve prediction. EnBNM scheme re-ranks participant‟s attribute by assigning inference to nodes base on conditional probability of Bayesian model. EnBNM‟s algorithm was validated using ground truth and SNA-Q model adopted for classifying Criminal Profile Status (CPS). EnBNM was tested using dataset of participants in November 17 Greece revolutionary group - (N‟17) and data of participants in September 11 Al-Qaeda terrorist group - (9/11). For N‟17 dataset, EBNM detected all alleged and convicted leaders. Additional two actors were detected who had the same CPS with convicted leaders. EnBNM also detected marginal actors; participants with high tendency to evasion. Out of four (4) detected fugitives, two of them belong to the first-generation leadership (G) faction. For 9/11: nine (9) out of nineteen (19) central participants detected by EBNM have the same CPS with convicted leaders. It means that seven (7) more actors are detected as additional key players by EnBNM that previous models did not detect. Six of these actors detected are conspirators. A financial aider to the group was detected among fugitives. The results corroborate that terrorist organisations are self-organised with decentralised key players as a measure to minimize effect of security perturbation. The simulation results showed that the court judgement of the N‟17 group was 40% in error as additional two actors were detected by EBNM apart from the three convicted leaders by court. It shows that support of intelligence is highly needed for effective disruption of OCG and terrorism. The EnBNM algorithm also detected over 80% of legitimate actors - less vulnerable participants in the 9/11 terrorist group and has 59.09% accuracy score in detection of conspirator





Related Project Materials

INFLUENCE OF EARLY CHILDHOOD EDUCATION ON RESPECT FOR DIVERSITY

ABSTRACT: This study explores the influence of early childhood education (ECE)...

Read more
FIRM ATTRIBUTES AND FINANCIAL INFORMATION QUALITY OF LISTED DEPOSIT MONEY BANKS IN NIGERIA

Abstract

This study examines the influence of Firm Attributes on Financial Information Quality of listed Deposit Money B...

Read more
EVALUATION OF HEAVY METALS, SOME ORGANIC AND MICROBIAL CONTAMINANTS IN THE EFFLUENTS FROM SOME FOOD INDUSTRIES IN ANAMBRA STATE, NIGERIA

ABSTRACT

This study was carried out to evaluate the concentrations of heavy metals and other contaminants in the effluents from some food...

Read more
PREVALENCE OF HIV/AIDS AMONG INTENDING DONORS

ABSTRACT

The Human Immune deficiency Virus(HIV) and the Acquired Immune Deficiency Syndrome (AIDS) situation in Nigeria has affected bloo...

Read more
AQUACULTURE RENAISSANCE IN AKWA IBOM STATE: A VERITABLE TOOL OF SUSTAINING THE LOCAL ECONOMY

Background of the Study

Aquaculture has, in fact, matured into a worldwide resilient and essential indu...

Read more
OIL PALM PRODUCTION AND ITS ECONOMIC IMPORTANCE IN EDO STATE

Abstract

This project work has assessed the palm oil production and its economic importance in Edo State using NIFOR as...

Read more
DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy syst...

Read more
THE ROLE OF CO-OPERATIVE SOCIETIES TOWARDS DEVELOPMENT OF RURAL AREAS

ABSTRACT

This research work was designed to see to the way the areas could be develope...

Read more
A COMPARATIVE ANALYSIS ON THE CHALLENGES OF TEACHING PRACTICE EXPERIENCES OF HOME ECONOMICS STUDENT-TEACHERS AND POSSIBLE PANACEA

BACKGROUND OF THE STUDY

A student teacher observed that the practical component of teacher training - practice teaching...

Read more
THE INFLUENCE OF DIGITAL TRANSFORMATION ON RISK MANAGEMENT

THE INFLUENCE OF DIGITAL TRANSFORMATION ON RISK MANAGEMENT

The study aims to: (1) analyze the impact of digital transformation on risk ma...

Read more
Share this page with your friends




whatsapp