Skip to main content

Dark Network Analysis

  • Chapter
  • First Online:
Dark Web

Part of the book series: Integrated Series in Information Systems ((ISIS,volume 30))

  • 5577 Accesses

Abstract

Dark networks such as terrorist networks and narcotics-trafficking networks are hidden from our view yet could have a devastating impact on our society and economy. Understanding the topology of these dark networks can reveal greater insight into these clandestine organizations and help develop effective disruptive strategies. Based on analysis of four real-world “dark” networks, we found that these covert networks share many common topological properties with other types of networks. Their efficiency in communication and flow of information, commands, and goods can be tied to their small-world structures characterized by small average path length (l) and high clustering coefficient (C). In addition, we found that because of the small-world properties, dark networks are more vulnerable to attacks on the bridges that connect different communities than to attacks on the hubs. This may provide authorities with insight for intelligence and security purposes. An interesting finding about the three human dark networks is their substantially high clustering coefficients, which are not always present in other empirical networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Albert, R. and Barabási, A.-L. Statistical mechanics of complex networks. Reviews of Modern Physics, 74 (1). 47–97, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  • Barabási, A.-L., Jeong, H., Zéda, Z., Ravasz, E., Schubert, A. and Vicsek, T. Evolution of the social network of scientific collaborations. Physica A, 311. 590–614, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  • Carlson, J.M. and Doyle, J. Highly optimized tolerance: A mechanism for power laws in designed systems. Physical Review E, 60 (2). 1412–1427, 1999.

    Article  Google Scholar 

  • Holme, P., Kim, B.J., Yoon, C.N. and Han, S.K. Attack vulnerability of complex networks. Physical Review E, 65. 056109, 2002.

    Article  Google Scholar 

  • Levitt, S.D. and Dubner, S.J. Freakonomics: A rogue economist explores the hidden side of everything. William Morrow, New York, NY, 2005.

    Google Scholar 

  • Liben-Nowell, D. and Kleinberg, J. The link prediction problem for social networks. in Proceedings of the 12th International Conference on Information and Knowledge Management, (New Orleans, LA, USA, 2003).

    Google Scholar 

  • Newman, M.E.J. Mixing patterns in networks. Physical Review E, 67 (2). 026126, 2003.

    Article  MathSciNet  Google Scholar 

  • Sageman, M. Understanding Terror Networks. University of Pennsylvania Press, Philadelphia, PA, 2004.

    Book  Google Scholar 

  • Wasserman, S. and Faust, K. Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge, 1994.

    Book  MATH  Google Scholar 

  • Watts, D.J. and Strogatz, S.H. Collective dynamics of “small-world” networks. Nature. 393. 440–442, 1998.

    Article  MATH  Google Scholar 

  • Xu, J. and Chen, H. Untangling criminal networks: A case study. in Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics (ISI’03), (Tucson, AZ, 2003), 232–248.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsinchun Chen .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Chen, H. (2012). Dark Network Analysis. In: Dark Web. Integrated Series in Information Systems, vol 30. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1557-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1557-2_6

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1556-5

  • Online ISBN: 978-1-4614-1557-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics