An Efficient Deep Learning Framework for Optimized Event Forecasting
Abstract
:1. Introduction
- An in-depth comparative analysis of terrorist attack detection is provided in the given study;
- To accurately predict future terrorist attack activities, we propose a DL-enabled hybrid LSTM–attention mechanism model that can identify the type of attack and type of weapon;
- To predict terrorist activities, the LSTM–attention mechanism model was trained to learn spatial features from the dataset. This allowed the model to take into account a variety of factors, including the type of weapons used and whether the type of attack was successful or not.
2. Literature Review
3. Methodology
3.1. Dataset
3.1.1. Weapon Type
3.1.2. Attack Type
3.2. Model Workflow
3.2.1. Deep Learning
3.2.2. Convolution Neural Networks
3.2.3. Long Short-Term Memory
3.2.4. Attention Mechanism
3.3. Proposed Architecture
4. Results
4.1. Results and Performance Measures
4.2. Comparison with Existing Approaches
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hou, Z.; Zhou, Y.; Wu, X.; Bu, F. Attention-Based Spatial–Temporal Multi-Graph Convolutional Networks for Casualty Prediction of Terrorist Attacks. Complex Intell. Syst. 2023, 9, 6307–6328. [Google Scholar] [CrossRef]
- Wang, Y. Machine Learning Based Terrorist Attacks Prediction Algorithm. Appl. Comput. Eng. 2023, 2, 391–397. [Google Scholar] [CrossRef]
- Miller, R. Book Review: Robert J. Bunker (Ed.), Networks, Terrorism and Global Insurgency, London and New York, Routledge, 2005; XXVI + 211 pp.; £26.99 pbk; ISBN 0415385946 Brynjar Lia, Globalisation and the Future of Terrorism: Patterns and Predictions, London and New York, Routledge, 2005; XVII + 259 pp.; £21.99 pbk; ISBN 0415402965. J. Contemp. Hist. 2009, 44, 373–376. [Google Scholar] [CrossRef]
- Uddin, M.I.; Zada, N.; Aziz, F.; Saeed, Y.; Zeb, A.; Ali Shah, S.A.; Al-Khasawneh, M.A.; Mahmoud, M. Prediction of Future Terrorist Activities Using Deep Neural Networks. Complexity 2020, 2020, 1373087. [Google Scholar] [CrossRef]
- Futia, G.; Vetrò, A. On the Integration of Knowledge Graphs into Deep Learning Models for a More Comprehensible AI-Three Challenges for Future Research. Information 2020, 11, 122. [Google Scholar] [CrossRef]
- Wen, D.; He, M.; Wang, Y.; Zhang, Y. Forecasting Stock Market Realized Volatility: The Role of Global Terrorist Attacks. Appl. Econ. 2023, 55, 2551–2566. [Google Scholar] [CrossRef]
- Li, Y.; Wu, Y. Research on the Impact of Crisis Events on Urban Development—A Case Study of Kunming Railway Station Terrorist Attack. In Proceedings of the 20th International Symposium on Advancement of Construction Management and Real Estate; Springer: Singapore, 2017. [Google Scholar]
- Vasilopoulos, P. Terrorist Events, Emotional Reactions, and Political Participation: The 2015 Paris Attacks. West Eur. Politics 2018, 41, 102–127. [Google Scholar] [CrossRef]
- Hu, X.; Lai, F.; Chen, G.; Zou, R.; Feng, Q. Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification. Sustainability 2019, 11, 1487. [Google Scholar] [CrossRef]
- Chauvelin, L.; Gindt, M.; Olliac, B.; Robert, P.; Thümmler, S.; Askenazy, F. Emergency Organization of Child Psychiatric Care Following the Terrorist Attack on July 14, 2016, in Nice, France. Disaster Med. Public Health Prep. 2019, 13, 144–146. [Google Scholar] [CrossRef]
- Weeratna, J.; Tennakoon, A. Management of The Dead and Missing People in the Easter Bombings in Colombo, Sri Lanka. J. Clin. Health Sci. 2021, 6, 59. [Google Scholar] [CrossRef]
- Tallach, R.; Einav, S.; Brohi, K.; Abayajeewa, K.; Abback, P.S.; Aylwin, C.; Batrick, N.; Boutonnet, M.; Cheatham, M.; Cook, F.; et al. Learning from Terrorist Mass Casualty Incidents: A Global Survey. Br. J. Anaesth. 2022, 128, e168–e179. [Google Scholar] [CrossRef] [PubMed]
- Feng, Y.; Wang, D.; Yin, Y.; Li, Z.; Hu, Z. An XGBoost-Based Casualty Prediction Method for Terrorist Attacks. Complex Intell. Syst. 2020, 6, 721–740. [Google Scholar] [CrossRef]
- Song, Y.; Chen, B.; Wang, X.Y. Cryptocurrency Technology Revolution: Are Bitcoin Prices and Terrorist Attacks Related? Financ. Innov. 2023, 9, 29. [Google Scholar] [CrossRef] [PubMed]
- Zhu, R.; Hu, X.; Li, X.; Ye, H.; Jia, N. Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method. Int. J. Environ. Res. Public Health 2020, 17, 2051. [Google Scholar] [CrossRef]
- LaFree, G.; Dugan, L. Introducing the Global Terrorism Database. Terror. Political Violence 2007, 19, 181–204. [Google Scholar] [CrossRef]
- Petroff, V.B.; Bond, J.H.; Bond, D.H. Using Hidden Markov Models to Predict Terror before It Hits (Again). In Handbook of Computational Approaches to Counterterrorism; Springer: New York, NY, USA, 2013; ISBN 9781461453116. [Google Scholar]
- Meng, X.; Nie, L.; Song, J. Big Data-Based Prediction of Terrorist Attacks. Comput. Electr. Eng. 2019, 77, 120–127. [Google Scholar] [CrossRef]
- Rai, A.K.; Kumar, S. Identifying the Leaders and Main Conspirators of the Attacks in Terrorist Networks. ETRI J. 2022, 44, 977–990. [Google Scholar] [CrossRef]
- Lu, P.; Li, M.; Zhang, Z. The Crowd Dynamics under Terrorist Attacks Revealed by Simulations of Three-Dimensional Agents. Artif. Intell. Rev. 2023, 56, 13103–13125. [Google Scholar] [CrossRef]
- Chatterjee, S.; Abkowitz, M.D. A Methodology for Modeling Regional Terrorism Risk. Risk Anal. 2011, 31, 1133–1140. [Google Scholar] [CrossRef]
- Al-Dahash, H.; Kulatunga, U.; Allali, B. Factors Affecting Risk Perception during Terrorist Attacks. Int. J. Disaster Risk Reduct. 2022, 73, 102870. [Google Scholar] [CrossRef]
- Kebir, O.; Nouaouri, I.; Rejeb, L.; Ben Said, L. ATiPreTA: An Analytical Model for Time-Dependent Prediction of Terrorist Attacks. Int. J. Appl. Math. Comput. Sci. 2022, 32, 495–510. [Google Scholar] [CrossRef]
- Baby, A.; Sruthi, A. Machine learning models for prediction of terrorist attacks: A comparative analysis in terrorism prone regions. In Proceedings of the 2023 Annual International Conference on Emerging Research Areas: International Conference on Intelligent Systems (AICERA/ICIS), Kanjirapally, India, 16–18 November 2023; pp. 1–6. [Google Scholar]
- de Oliveira, R.A.; Bollen, M.H.J. Deep Learning for Power Quality. Electr. Power Syst. Res. 2023, 214, 108887. [Google Scholar] [CrossRef]
- Huamaní, E.L.; Alicia, A.M.; Roman-Gonzalez, A. Machine Learning Techniques to Visualize and Predict Terrorist Attacks Worldwide Using the Global Terrorism Database. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 562–570. [Google Scholar] [CrossRef]
- Chen, J.H.; Asch, S.M. Machine Learning and Prediction in Medicine—Beyond the Peak of Inflated Expectations. N. Engl. J. Med. 2017, 376, 2507–2509. [Google Scholar] [CrossRef]
- Verma, C.; Verma, V. Predictive Modeling of Terrorist Attacks Using Machine Learning. Int. J. Pure Appl. Math. 2018, 119, 49–61. [Google Scholar]
- Gundabathula, V.T.; Vaidhehi, V. An Efficient Modelling of Terrorist Groups in India Using Machine Learning Algorithms. Indian J. Sci. Technol. 2018, 11, 1–10. [Google Scholar] [CrossRef]
- Mo, H.; Meng, X.; Li, J.; Zhao, S. Terrorist Event Prediction Based on Revealing Data. In Proceedings of the 2017 IEEE 2nd International Conference on Big Data Analysis, ICBDA 2017, Beijing, China, 10–12 March 2017. [Google Scholar]
- Alhamdani, R.S.; Abdullah, M.N.; Sattar, I.A. Recommender System for Global Terrorist Database Based on Deep Learning. Int. J. Mach. Learn. Comput. 2018, 8, 6. [Google Scholar] [CrossRef]
- Kumar, V.; Mazzara, M.; Messina, A.; Lee, J.Y. A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks: Prevention and Prediction for Combating Terrorism. In Proceedings of 6th International Conference in Software Engineering for Defence Applications; Springer; Cham, Switzerland, 2020. [Google Scholar]
- Semmelbeck, J.; Besaw, C. Exploring the Determinants of Crime-Terror Cooperation Using Machine Learning. J. Quant. Criminol. 2020, 36, 527–558. [Google Scholar] [CrossRef]
- Luo, L.; Qi, C. An Analysis of the Crucial Indicators Impacting the Risk of Terrorist Attacks: A Predictive Perspective. Saf. Sci. 2021, 144, 105442. [Google Scholar] [CrossRef]
- Bridgelall, R. An Application of Natural Language Processing to Classify What Terrorists Say They Want. Soc. Sci. 2022, 11, 23. [Google Scholar] [CrossRef]
- Saidi, F.; Trabelsi, Z. Corrigendum to “A hybrid deep learning-based framework for future terrorist activities modeling and prediction” [Egypt. Inform. J. 23 (3) 2022, 437–446]. Egypt. Inform. J. 2023, 24, 215–216. [Google Scholar] [CrossRef]
- Arifin, V.; Jallow, F.B.; Lubis, A.; Bahaweres, R.B.; Rofiq, A.A. Using Deep Learning Model to Predict Terms Use by Terrorist to Pre-Plan an Attack on a Real-Time Twitter Tweets from Rapid Miner. In Proceedings of the 2022 10th International Conference on Cyber and IT Service Management, CITSM 2022, Yogyakarta, Indonesia, 20–21 September 2022. [Google Scholar]
- Shinde, S.; Khoje, S.; Raj, A.; Wadhwa, L.; Shaikh, A.S. Artificial Intelligence Approach for Terror Attacks Prediction through Machine Learning. Multidiscip. Sci. J. 2024, 6, 2024011. [Google Scholar] [CrossRef]
- Lamptey, O.; Gegov, A.; Ouelhadj, D.; Hopgood, A.; Da Deppo, S. Neural Network Based Identification of Terrorist Groups Using Explainable Artificial Intelligence. In Proceedings of the 2023 IEEE Conference on Artificial Intelligence (CAI), Santa Clara, CA, USA, 5–6 June 2023; pp. 191–192. [Google Scholar] [CrossRef]
- Wang, Y.; Cui, X.; He, P. Winning the War on Terror: Using “Top-K” Algorithm and CNN to Assess the Risk of Terrorists. Int. J. Inf. Technol. Web Eng. 2022, 17, 1–15. [Google Scholar] [CrossRef]
- Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P. SMOTE: Synthetic minority over-sampling technique. J. Artif. Int. Res. 2002, 16, 321–357. [Google Scholar] [CrossRef]
- Ali, S.; Ali, H.H.; Qayyum, S.; Sohail, F.; Tahir, F.; Maqsood, S.; Adil, M. Multi-Agent System Using Scrum Methodology for Software Process Management. In Intelligent Technologies and Applications; Springer: Singapore, 2019. [Google Scholar]
- Janiesch, C.; Zschech, P.; Heinrich, K. Machine Learning and Deep Learning. Electron. Mark. 2021, 31, 685–695. [Google Scholar] [CrossRef]
- Bui, D.T.; Tsangaratos, P.; Nguyen, V.T.; Van Liem, N.; Trinh, P.T. Comparing the Prediction Performance of a Deep Learning Neural Network Model with Conventional Machine Learning Models in Landslide Susceptibility Assessment. Catena 2020, 188, 104426. [Google Scholar] [CrossRef]
- Mayerich, D.; Sun, R.; Guo, J. Deep Learning. In Microscope Image Processing, 2nd ed.; Academic Press: Cambridge, MA, USA, 2022; ISBN 9780128210499. [Google Scholar]
- Ismail Fawaz, H.; Forestier, G.; Weber, J.; Idoumghar, L.; Muller, P.A. Deep Learning for Time Series Classification: A Review. Data Min. Knowl. Discov. 2019, 33, 917–963. [Google Scholar] [CrossRef]
- Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
- Srivastava, N.; Hinton, G.; Krizhevsky, A.; Sutskever, I.; Salakhutdinov, R. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. J. Mach. Learn. Res. 2014, 15, 1929–1958. [Google Scholar]
- Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, Ł.; Polosukhin, I. Attention Is All You Need. In Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4–9 December 2017. [Google Scholar]
- Soydaner, D. Attention Mechanism in Neural Networks: Where It Comes and Where It Goes. Neural Comput. Appl. 2022, 34, 13371–13385. [Google Scholar] [CrossRef]
- Nayak, N.; Rayachoti, M.; Gupta, A.M.; Prerna, G.P.; Sreenath, V.M.; Annapurna, D. Learning Future Terrorist Targets Using Attention Based Hybrid CNN and BiLSTM Model. In Proceedings of the 2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023, Raichur, India, 24–25 February 2023. [Google Scholar]
- Pan, X. Quantitative Analysis and Prediction of Global Terrorist Attacks Based on Machine Learning. Sci. Program. 2021, 2021, 7890923. [Google Scholar] [CrossRef]
- Jiang, D.; Wu, J.; Ding, F.; Ide, T.; Scheffran, J.; Helman, D.; Zhang, S.; Qian, Y.; Fu, J.; Chen, S.; et al. An Integrated Deep-Learning and Multi-Level Framework for Understanding the Behavior of Terrorist Groups. Heliyon 2023, 9, e18895. [Google Scholar] [CrossRef] [PubMed]
- Campedelli, G.M.; Bartulovic, M.; Carley, K.M. Learning Future Terrorist Targets through Temporal Meta-Graphs. Sci. Rep. 2021, 11, 8533. [Google Scholar] [CrossRef]
- Campedelli, G.M.; Cruickshank, I.; Carley, K.M. Multi-Modal Networks Reveal Patterns of Operational Similarity of Terrorist Organizations. Terror. Political Violence 2023, 35, 1065–1084. [Google Scholar] [CrossRef]
- Bangerter, M.L.; Fenza, G.; Gallo, M.; Loia, V.; Petrone, A.; Volpe, A. Terrorist Organization Identification Using Link Prediction over Heterogeneous GNN. Hum.-Centric Comput. Inf. Sci. 2022, 12, 1–13. [Google Scholar] [CrossRef]
- Alshingiti, Z.; Alaqel, R.; Al-Muhtadi, J.; Haq, Q.E.U.; Saleem, K.; Faheem, M.H. A Deep Learning-Based Phishing Detection System Using CNN, LSTM, and LSTM-CNN. Electronics 2023, 12, 232. [Google Scholar] [CrossRef]
- Qazi, E.U.H.; Faheem, M.H.; Zia, T. HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System. Appl. Sci. 2023, 13, 4921. [Google Scholar] [CrossRef]
- START (National Consortium for the Study of Terrorism and Responses to Terrorism). Global Terrorism Database 1970–2020 [Data File]. 2022. Available online: https://www.start.umd.edu/gtd (accessed on 4 April 2024).
Ref. | Proposed Method | Dataset | Results | Limitations |
[1] | They proposed a deep learning method to predict time series information of terrorist attacks. | Global Terrorist Attack | - | Experimental results are not compared with other methodologies. |
[2] | They identified unstructured data from a dataset to identify terrorist attack risk. | Terrorist Attack | Accuracy 96.34% | There are no details of the experiment mentioned. |
[4] | They detected different behaviors of terrorist attacks using different deep learning techniques. | Global Terrorist Attack | Accuracy 95% | The system performs complex computations due to the involvement of different deep-learning models. |
[30] | They proposed a model for the early detection of terrorist attacks using an early warning detector. | Global Terrorist Attack | Precision 78.41% | The proposed system has a higher error rate in data classification. |
[31] | They detected how online media and social media are used by terrorists for the dissemination of their data. | Global Terrorist Attack | - | There are no details of the experiment mentioned. Experimental results are not mentioned and compared with other methodologies. |
[32] | They detected whether any organization took responsibility for an attack or whether it was an anonymous attack. | Terrorist Attack | Accuracy 90–95% | Because of the big size of the dataset, the experimental work was performed on a small portion of the data, so the results were biased. |
[33] | They identified the risk of terrorist attacks in an environment and organization using machine learning algorithms. | - | - | The results were biased due to imperfections in the dataset. |
[34] | They identified crucial indicators for the prediction of the risk of terrorist attacks. | Self-Generated | - | There are no details of the experiment mentioned. Experimental results are not mentioned and compared with other methodologies. |
[35] | They detected the narration of terrorists for the prevention of terrorist attacks using NLP and eleven machine learning models. | Terrorist Attack | Accuracy 95% | Due to the large size of the dataset, the data were not fully used and the results were not well classified. |
[36] | They detected terrorist attack behaviors for future attacks using a deep learning model from GAD. | Global Terrorist Attack | Accuracy 96% | The system has computational complexity due to the large size of the dataset and the complex structure of the deep learning model. |
[37] | They proposed a system to predict the comprehensive behavior of terrorist attacks. | Terrorist Attack | Accuracy 68% | More improvements to the proposed system are needed for better results. |
[38] | They proposed a model in which users can visualize the risk of terrorist attacks using machine learning models. | Global Terrorist Attack | Accuracy 90% | The system is still under development and the authors aim to attain better results. |
[39] | They predicted terrorist attacks using deep learning algorithms and the SHAP method. | Global Terrorist Attack | Accuracy 96% | The detailed workings of the model are not mentioned. |
[40] | They proposed a model to detect early warnings for counterterrorism with the help of a deep learning model. | Global Counter-Terrorism | - | Experimental results are not compared with other methodologies. |
Weapon Type | Instances |
---|---|
Explosives | 30,000 per class |
Firearms | |
Incendiary | |
Melee | |
Other |
Attack Type | Instances |
---|---|
Bombing/Explosion | 30,000 per class |
Armed Assault | |
Assassination | |
Hostage-taking (Kidnapping) | |
Facility/Infrastructure Attack | |
Other |
Class Label | Accuracy | Loss | Precision | Recall | F1-Score | ||
---|---|---|---|---|---|---|---|
Training (%) | Testing (%) | Training | Testing | ||||
Attack Type | 99.2 | 98.12 | 0.008 | 0.188 | 98.12 | 98.12 | 98.11 |
Weapon Type | 98.1 | 97.6 | 0.019 | 0.024 | 97.60 | 97.60 | 97.59 |
Settings | Parameters |
---|---|
Epochs: | Attack Type 50 Weapon Type 50 |
Loss function: | Cross-entropy |
Optimizer: | Adam |
Activation function: | Sigmoid |
Batch size: | 32 |
Dropout: | 0.5 |
Ref. | Methodology | Dataset | Limitations | Accuracy |
---|---|---|---|---|
[4] (Uddin, et al.), 2020 | Future terrorist attack prediction using five deep learning models. | Global Terrorism Database (GTD) | The models are not able to make predictions of future attacks with high accuracy. | 95% |
[36] (Saidi, et al.), 2022 | Hybrid CNN-LSTM and DL framework for predicting future terrorist activities. | Global Terrorism Database (GTD) | The model does not incorporate the local features of the dataset. | 99.2% |
[37] | Deep learning model to predict terms used by terrorists to pre-plan an attack on real-time Twitter tweets from Rapid Miner. | Global Terrorism Database (GTD) | The results and implementation details are not mentioned. | 89% |
[51] | A deep learning model using an attention-based hybrid CNN and BiLSTM model to learn future terrorist targets. | Global Terrorism Database (GTD) | In the proposed model, not all the models show learning rates accurately. | 97.2% |
[52] | Classification framework based on ensemble learning for classifying and predicting. | Global Terrorism Database (GTD) | Further improvements in the performance and accuracy of machine learning algorithms are required. | 97.1% |
[53] | A deep-learning and multi-level framework for understanding the behavior of terrorist groups. | Global Terrorism Database (GTD) | The results and implementation details are not mentioned. | - |
[54] | Temporal meta-graphs and a deep learning model for the forecasting of future terrorist targets. | Global Terrorism Database (GTD) | Most regional attacks are predicted based on predictions. | 95% |
[55] | A multi-modal network reveals patterns of operational similarity among terrorist organizations. | Global Terrorism Database (GTD) | The experimental results were for specific years: 2012–2018. | 96.5% |
[56] | Network strategy developed to measure the terrorist network in a region. | Global Terrorism Database (GTD) | The network becomes complex as the depth of the nodes increases. | - |
[57] | Hybrid LSTM–CNN | Legitimate and phishing websites | LSTM–CNN and LSTM models performed slightly lower in accuracy | 97.6% |
[58] | Hybrid Deep Learning-Based Network Intrusion Detection System | CICIDS-2018 | The deep-layered architecture combining CNN and RNN is resource-intensive | 98.9% |
Proposed Study | Hybrid CNN-LSTM model for the detection of terrorist attacks. | Global Terrorism Database (GTD) | More target factors can be chosen from the dataset. | Attack Type: 98.12% Weapon Type: 97.6% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Qazi, E.U.H.; Faheem, M.H.; Zia, T.; Imran, M.; Ahmad, I. An Efficient Deep Learning Framework for Optimized Event Forecasting. Information 2024, 15, 701. https://doi.org/10.3390/info15110701
Qazi EUH, Faheem MH, Zia T, Imran M, Ahmad I. An Efficient Deep Learning Framework for Optimized Event Forecasting. Information. 2024; 15(11):701. https://doi.org/10.3390/info15110701
Chicago/Turabian StyleQazi, Emad Ul Haq, Muhammad Hamza Faheem, Tanveer Zia, Muhammad Imran, and Iftikhar Ahmad. 2024. "An Efficient Deep Learning Framework for Optimized Event Forecasting" Information 15, no. 11: 701. https://doi.org/10.3390/info15110701
APA StyleQazi, E. U. H., Faheem, M. H., Zia, T., Imran, M., & Ahmad, I. (2024). An Efficient Deep Learning Framework for Optimized Event Forecasting. Information, 15(11), 701. https://doi.org/10.3390/info15110701