Terrorism Detection Model using Naive Bayes Classifier

International Journal of Computer Science and Engineering
© 2020 by SSRG - IJCSE Journal
Volume 7 Issue 12
Year of Publication : 2020
Authors : Francisca Onaolapo Oladipo, Ogunsanya Funmilayo Blessing, Ezendu Ariwa

pdf
How to Cite?

Francisca Onaolapo Oladipo, Ogunsanya Funmilayo Blessing, Ezendu Ariwa, "Terrorism Detection Model using Naive Bayes Classifier," SSRG International Journal of Computer Science and Engineering , vol. 7,  no. 12, pp. 9-15, 2020. Crossref, https://doi.org/10.14445/23488387/IJCSE-V7I12P103

Abstract:

The advancement in microblogging has brought an increasing area of interest in sentiment analysis. Terrorist groups have been involved in using social media sites like YouTube, Facebook, and Twitter to propagate their ideology and recruitment of individuals. This work aims to propose a terrorism-related content analysis framework focusing on classifying tweets into terrorist and non-terrorist classes. Based on user-generated social media posts on Twitter, we developed a tweet classification system using supervised learning-based sentiment analysis techniques to classify the tweets as terrorist or non-terrorist. Our results indicate that an automated approach to aid analysts in detecting terrorism content on social media is a promising way forward.

Keywords:

Classification, Naïve bayes, classification, text Mining, terrorism.

References:

[1] Lui, B. Sentiment analysis and subjectivity. Handbook of Natural language processing. (2010).
[2] Kim, S.-M., & Hovy, E. Determining the sentiment of opinions. proceedings of the 20th international conference on computational linguistics, 1367, (2004).
[3] Yardon D. (2016). Twitter deletes 125,000 Isis accounts and expands anti-terror teams. The Guardian International Edition. A report published Fri, February 5, (2016). 20:18GMT https://www.theguardian.com/technology/2016/feb/05/twitter-deletes-isis-accounts-terrorism-online
[4] Agarwal, S., & Sureka, A. A focused crawler for mining hate and extremism promoting videos on youtube. Proceedings of the 25th ACM conference on Hypertext and Social media, (2014) 294–296.
[5] Merari, A., & Friedland, N. Social psychological aspects of political terrorism in visualization. IEEE Symposium on Visual Analytics Science and Technology. (2007).
[6] Sloan, S., & Anderson, S. Historical dictionary of terrorism. scarecrow Press. (2009).
[7] FBI. Retrieved March 10, 2019, from http://www.fbi.gov/.(2015).
[8] Fisher, A. N. The call up: The roots of a resilient and persistent jihadist presence on Twitter. (2004).
[9] Fisher, A. Last gang in town. How Jihadist network maintain a persistent presence online, in the perspective of terrorism. (2015).
[10] Miranda Filho, R., Almeida, J., & Pappa, G. Twitter population sample bias and its impact on predictive outcomes: A case study on elections. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, (2015) 1254–1261.
[11] Paulo, A., Donald, C., & Ivens, P. The use of Machine Learning Algorithms in Recommender Systems: A systematic review. Expert Systems With Applications, 97. (2015).
[12] Pang, B., & Lee, L. Opinion mining and sentiment analysis. Foundations and Trends in Information extraction, 2, (2008) 1-135
[13] Vishal, A., & Sonawane. Sentiment analysis of Twitter data: A survey of techniques. International journal of computer application, 139. (2016).
[14] Pang, B., Lee, L., & Vaithyanathan, S. Thumbs up?: Sentiment classification using machine learning techniques. Proceedings of the ACL-02 conference on Empirical methods in natural language processing, 10, (2012) 79-86.
[15] Abbasi, A., Chen, H., & Salem, A. Sentiment analysis in multiple languages: Feature selection for opinion classification in web forums. In ACM Transactions on Information Systems, 26(3), (2008) 1-34.
[16] Harb, A., Planti, M., Dray, G., Roche, M., Trousset, O., & Poncelet, P. Web opinion mining: how to extract opinions from blogs?. Proceedings of the 5th international conference on soft computing as transdisciplinary science and technology. Cergy-Pontoise, France. (2008).
[17] Shetty, R., Nair, K., Singh, S., Nakhare, S., & Upadhye, G. A System to Detect inappropriate Messages in Online Social Networks. International Journal of Advanced Computational Engineering and Networking, 3(3), (2015) 40-43.
[18] Walid, W. I. #failedrevolutions: Using Twitter to study the antecedents of isis support., arXiv preprint arXiv:1503.02401. (2015).
[19] Walid, M., Kareem, D., & Ingmar, W. (2015). #FailedRevolutions: Using Twitter to study the antecedents of ISIS support.
doi:10.5210/fm.v21i2.6372
[20] Pooja, W., & Bhatia, M. Classification of Radical Message on Twitter using Security Association. In Case of Studies in secure computing: Achievements and Trends, 273. (2016).
[21] Ashcroft, M., Fisher, A., Lisa, K., Enghin, O., & Nico, P. Detecting Jihadist Messages on Twitter. Intelligence and security informatics Conference(EISIC), European, (2015) 161-164.
[22] Surendiran, R., and Alagarsamy,K., 2010. Skin Detection Based Cryptography in Steganography (SDBCS). International Journal of Computer Science and Information Technologies (IJCSIT), 1(4), 221-225.
[23] Kaati, L., Omer, E., Prucha, N. and Shrestha, A.. Detecting multipliers of jihadism on Twitter. In Data Mining Workshop (ICDMW), 2015 IEEE International Conference, (2015) 954-960.