Online Terrorism Detection Using Webdata Mining

Author:

RH Aswathy1,K Roslin Dayana2,M Vigilson Prem2

Affiliation:

1. KPR Institute of Engineering and Technology, India

2. RMD Engineering College, India

Abstract

Technology growth in facebook, whatsapp, instagram has become famous and widely used in diverse social media groups. The intention of facebook is to make the universe widely open and to stay connected. The recent mission of facebook is to stay connected with friends, colleagues, family through sharing photos, videos, stories etc. to show the daily events in the world, which provides the mean to share and express the feelings on what matters to them. Cross platform Instant messaging applications like Telegram and WhatsApp Messenger that smart phone users to establish a ubiquitous technology to exchange text, image, video and audio messages for free. This flexible technology explores more opportunities for risk and benefit for the modern era. Terrorism has increased in certain fragile parts of the world and they attack remotely. New technologies like Artificial intelligence, Machine learning autonomous and semi-autonomous systems are used by terrorist group to attack the network. These groups use social media weapons like facebook, whatsapp, Instagram to spread their information on the social network. It is essential to detect, pre-empt, prevent and eliminate the terrorism through technological spear. Terrorist groups are utilizing the internet as a platform together and convince the sin less people to take part in terrorist activities by infuriating them through web pages that inspired is enchanted individuals to take part in terrorist activities. The detection of terrorist activities needs enormous human effort. To reduce the human effort, our implement system detects the terrorist groups in social media using data mining algorithm. The intention of this work is to is to reduce the terrorism spread and to remove the terrorism related accounts effortlessly.

Publisher

IJAICT India Publications

Reference25 articles.

1. [1]. Jannach, D. and Fischer, S., October. Recommendation-based modeling support for data mining processes. In Proceedings of the 8th ACM Conference on Recommender systems (pp. 337-340),2014.

2. [2]. Han, J., Pei, J. and Kamber, M., Data mining: concepts and techniques. Elsevier,2011.

3. [3]. T. Sumil Kumar, Dr.K.Suvarchala,” A Study of Web Data Mining Challenges and Applications for Information Extraction”,November-2012

4. [4]. Ahsan, S. and Shah, A., April. Data mining, semantic web and advanced information technologies for fighting terrorism. In 2008 International Symposium on Biometrics and Security Technologies (pp. 1-5),2008. IEEE.

5. [5]. Elovici, Y., Kandel, A., Last, M., Shapira, B. and Zaafrany, O., Using data mining techniques for detecting terror-related activities on the web. Journal of Information Warfare, 3(1), pp.17-28.6,2013. http://citeseerx.ist.psu.edu

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3