Affiliation:
1. KPR Institute of Engineering and Technology, India
2. RMD Engineering College, India
Abstract
Technology growth in facebook, whatsapp, instagram has become famous and widely used in diverse social media groups. The intention of facebook is to make the universe widely open and to stay connected. The recent mission of facebook is to stay connected with friends, colleagues, family through sharing photos, videos, stories etc. to show the daily events in the world, which provides the mean to share and express the feelings on what matters to them. Cross platform Instant messaging applications like Telegram and WhatsApp Messenger that smart phone users to establish a ubiquitous technology to exchange text, image, video and audio messages for free. This flexible technology explores more opportunities for risk and benefit for the modern era. Terrorism has increased in certain fragile parts of the world and they attack remotely. New technologies like Artificial intelligence, Machine learning autonomous and semi-autonomous systems are used by terrorist group to attack the network. These groups use social media weapons like facebook, whatsapp, Instagram to spread their information on the social network. It is essential to detect, pre-empt, prevent and eliminate the terrorism through technological spear. Terrorist groups are utilizing the internet as a platform together and convince the sin less people to take part in terrorist activities by infuriating them through web pages that inspired is enchanted individuals to take part in terrorist activities. The detection of terrorist activities needs enormous human effort. To reduce the human effort, our implement system detects the terrorist groups in social media using data mining algorithm. The intention of this work is to is to reduce the terrorism spread and to remove the terrorism related accounts effortlessly.
Publisher
IJAICT India Publications
Reference25 articles.
1. [1]. Jannach, D. and Fischer, S., October. Recommendation-based modeling support for data mining processes. In Proceedings of the 8th ACM Conference on Recommender systems (pp. 337-340),2014.
2. [2]. Han, J., Pei, J. and Kamber, M., Data mining: concepts and techniques. Elsevier,2011.
3. [3]. T. Sumil Kumar, Dr.K.Suvarchala,” A Study of Web Data Mining Challenges and Applications for Information Extraction”,November-2012
4. [4]. Ahsan, S. and Shah, A., April. Data mining, semantic web and advanced information technologies for fighting terrorism. In 2008 International Symposium on Biometrics and Security Technologies (pp. 1-5),2008. IEEE.
5. [5]. Elovici, Y., Kandel, A., Last, M., Shapira, B. and Zaafrany, O., Using data mining techniques for detecting terror-related activities on the web. Journal of Information Warfare, 3(1), pp.17-28.6,2013. http://citeseerx.ist.psu.edu