-
Deep Learning Criminal Networks
Authors:
Haroldo V. Ribeiro,
Diego D. Lopes,
Arthur A. B. Pessa,
Alvaro F. Martins,
Bruno R. da Cunha,
Sebastian Goncalves,
Ervin K. Lenzi,
Quentin S. Hanley,
Matjaz Perc
Abstract:
Recent advances in deep learning methods have enabled researchers to develop and apply algorithms for the analysis and modeling of complex networks. These advances have sparked a surge of interest at the interface between network science and machine learning. Despite this, the use of machine learning methods to investigate criminal networks remains surprisingly scarce. Here, we explore the potenti…
▽ More
Recent advances in deep learning methods have enabled researchers to develop and apply algorithms for the analysis and modeling of complex networks. These advances have sparked a surge of interest at the interface between network science and machine learning. Despite this, the use of machine learning methods to investigate criminal networks remains surprisingly scarce. Here, we explore the potential of graph convolutional networks to learn patterns among networked criminals and to predict various properties of criminal networks. Using empirical data from political corruption, criminal police intelligence, and criminal financial networks, we develop a series of deep learning models based on the GraphSAGE framework that are able to recover missing criminal partnerships, distinguish among types of associations, predict the amount of money exchanged among criminal agents, and even anticipate partnerships and recidivism of criminals during the growth dynamics of corruption networks, all with impressive accuracy. Our deep learning models significantly outperform previous shallow learning approaches and produce high-quality embeddings for node and edge properties. Moreover, these models inherit all the advantages of the GraphSAGE framework, including the generalization to unseen nodes and scaling up to large graph structures.
△ Less
Submitted 4 June, 2023; v1 submitted 17 April, 2023;
originally announced April 2023.
-
Machine Learning Partners in Criminal Networks
Authors:
Diego D. Lopes,
Bruno R. da Cunha,
Alvaro F. Martins,
Sebastian Goncalves,
Ervin K. Lenzi,
Quentin S. Hanley,
Matjaz Perc,
Haroldo V. Ribeiro
Abstract:
Recent research has shown that criminal networks have complex organizational structures, but whether this can be used to predict static and dynamic properties of criminal networks remains little explored. Here, by combining graph representation learning and machine learning methods, we show that structural properties of political corruption, police intelligence, and money laundering networks can b…
▽ More
Recent research has shown that criminal networks have complex organizational structures, but whether this can be used to predict static and dynamic properties of criminal networks remains little explored. Here, by combining graph representation learning and machine learning methods, we show that structural properties of political corruption, police intelligence, and money laundering networks can be used to recover missing criminal partnerships, distinguish among different types of criminal and legal associations, as well as predict the total amount of money exchanged among criminal agents, all with outstanding accuracy. We also show that our approach can anticipate future criminal associations during the dynamic growth of corruption networks with significant accuracy. Thus, similar to evidence found at crime scenes, we conclude that structural patterns of criminal networks carry crucial information about illegal activities, which allows machine learning methods to predict missing information and even anticipate future criminal behavior.
△ Less
Submitted 7 September, 2022;
originally announced September 2022.
-
Empirical determination of the optimum attack for fragmentation of modular networks
Authors:
Carolina de Abreu,
Bruno Requião da Cunha,
Sebastián Gonçalves
Abstract:
All possible removals of $n=5$ nodes from networks of size $N=100$ are performed in order to find the optimal set of nodes which fragments the original network into the smallest largest connected component. The resulting attacks are ordered according to the size of the largest connected component and compared with the state of the art methods of network attacks. We chose attacks of size $5$ on rel…
▽ More
All possible removals of $n=5$ nodes from networks of size $N=100$ are performed in order to find the optimal set of nodes which fragments the original network into the smallest largest connected component. The resulting attacks are ordered according to the size of the largest connected component and compared with the state of the art methods of network attacks. We chose attacks of size $5$ on relative small networks of size $100$ because the number of all possible attacks, ${100}\choose{5}$ $\approx 10^8$, is at the verge of the possible to compute with the available standard computers. Besides, we applied the procedure in a series of networks with controlled and varied modularity, comparing the resulting statistics with the effect of removing the same amount of vertices, according to the known most efficient disruption strategies, i.e., High Betweenness Adaptive attack (HBA), Collective Index attack (CI), and Modular Based Attack (MBA). Results show that modularity has an inverse relation with robustness, with $Q_c \approx 0.7$ being the critical value. For modularities lower than $Q_c$, all heuristic method gives mostly the same results than with random attacks, while for bigger $Q$, networks are less robust and highly vulnerable to malicious attacks.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
Performance of attack strategies on modular networks
Authors:
Bruno Requião da Cunha,
Sebastián Gonçalves
Abstract:
Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malici…
▽ More
Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks with well defined community structures and consequent high modularity.
△ Less
Submitted 8 August, 2016;
originally announced August 2016.
-
Complex networks vulnerability to module-based attacks
Authors:
Bruno Requião da Cunha,
Juan Carlos González-Avella,
Sebastián Gonçalves
Abstract:
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that…
▽ More
In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from practical points of view. In this contribution we present a module-based method to efficiently break complex networks. The procedure first identifies the communities in which the network can be represented, then it deletes the nodes (edges) that connect different modules by its order in the betweenness centrality ranking list. We illustrate the method by applying it to various well known examples of social, infrastructure, and biological networks. We show that the proposed method always outperforms vertex (edge) attacks which are based on the ranking of node (edge) degree or centrality, with a huge gain in efficiency for some examples. Remarkably, for the US power grid, the present method breaks the original network of 4941 nodes to many fragments smaller than 197 nodes (4% of the original size) by removing mere 164 nodes (~3%) identified by the procedure. By comparison, any degree or centrality based procedure, deleting the same amount of nodes, removes only 22% of the original network, i.e. more than 3800 nodes continue to be connected after that
△ Less
Submitted 1 February, 2015;
originally announced February 2015.