📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 5, ISSUE 5, MAY 2016

Terrorism in the Cyber Space: The New Battlefield

Saumya Gupta, Akhilesh Tiwari

DOI: 10.17148/IJARCCE.2016.5552

Abstract: Terrorism has become a global threat from the past few decades and needs to be controlled from the grass root level to the universal level. Internet technology makes it easy for terrorist groups to communicate with relative anonymity, rapidly and effectively across borders, to an almost illimitable audience. This emerged as a threat to nation�s internal security therefore identification of terrorist groups on cyber space has become essential task in recent times. It is the task of determining associations and predicting the relationships that may exist between terrorist nodes. This has several applications including the recognition of terrorism, drug trafficking, gang related offences, frauds and armed robberies etc. There are two types of warfare in the world of terrorism: Conventional Warfare and Cyber Warfare. Conventional Warfare deals with the terrorism occurring on the four dimensions (land, sea, air & space) whereas Cyber Warfare deals with the 5th dimension i.e. Cyber Space. The use of the Internet space for terrorist purposes creates both challenges and opportunities in the fight against terrorism. This paper is a review on Cyber warfare as it has several benefits over Conventional warfare such as easier identification of crucial nodes & links; law enforcement agencies will get help and support to counter terrorism attacks.



Keywords: Data mining, Social connections, Social network analysis, Investigative data mining, Terrorist network mining, Terrorist using social media, Graph theory.

How to Cite:

[1] Saumya Gupta, Akhilesh Tiwari, “Terrorism in the Cyber Space: The New Battlefield,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2016.5552