Abstract

One of the most important threats to today’s civilization is terrorism. Terrorism not only disturbs the law and order situations in a society but also affects the quality of lives of humans and makes them suppressed physically and emotionally and deprives them of enjoying life. The more the civilizations have advanced, the more the people are working towards exploring different mechanisms to protect the mankind from terrorism. Different techniques have been used as counterterrorism to protect the lives of individuals in society and to improve the quality of life in general. Machine learning methods have been recently explored to develop techniques for counterterrorism based on artificial intelligence (AI). Since deep learning has recently gained more popularity in machine learning domain, in this paper, these techniques are explored to understand the behavior of terrorist activities. Five different models based on deep neural network (DNN) are created to understand the behavior of terrorist activities such as is the attack going to be successful or not? Or whether the attack is going to be suicide or not? Or what type of weapon is going to be used in the attack? Or what type of attack is going to be carried out? Or what region is going to be attacked? The models are implemented in single-layer neural network (NN), five-layer DNN, and three traditional machine learning algorithms, i.e., logistic regression, SVM, and Naïve Bayes. The performance of the DNN is compared with NN and the three machine learning algorithms, and it is demonstrated that the performance in DNN is more than 95% in terms of accuracy, precision, recall, and F1-Score, while ANN and traditional machine learning algorithms have achieved a maximum of 83% accuracy. This concludes that DNN is a suitable model to be used for predicting the behavior of terrorist activities. Our experiments also demonstrate that the dataset for terrorist activities is big data; therefore, a DNN is a suitable model to process big data and understand the underlying patterns in the dataset.

1. Introduction

One of the most important threats to today’s civilization is terrorism, which has affected the quality of lives of people in the whole world [1]. Terrorism means the use of intentional indiscriminate and illegal power and violence for creating terror amongst general population in order to gain some political, monetary, religious, or legal objectives. The definition of terrorism according to Hoffman [2] is “the deliberate creation and exploitation of fear through violence or the threat of violence in the pursuit of political change.” The objectives of terrorism are to create instability by creating fear, anxiety, and uncertainty on a larger scale compared to a single individual. According to Global Terrorism Database (GTD), in 2019 alone 1,411 different terrorist attacks have happened, causing 6,362 fatalities and badly affecting the quality of life of individuals in the society. A visualization of world map showing different terrorist activities is given in Figure 1 (image source: https://www.start.umd.edu/gtd/). The orange color shows high intensity value as a combination of incident fatalities and injuries. The map shows a very high rate of terrorism in South Asia and the Middle East.

The response of terrorist events is constant sense of fear, feeling helpless, experiencing fear and anger, and intolerance or aggression towards certain ethnicity or religious groups. It is equally important that the emotional reactions of the population is understood in regard to terrorist events so that we are able to design assistance to effectively help those who are suffering from these issues or they do not react to carry out another terrorist activity as a revenge. Terrorism has been studied for decades to understand the major factors causing the act of terrorism or understanding how to perform counterterrorism or understanding the social and economic effects of terrorism [3, 4]. However, because of the complex nature of terrorism, it is difficult to find an effective solution that can be used as a counterterrorism to protect the lives of individuals. Identification of terrorist ideologies and prediction of future terrorist attacks have been proven to be of great importance and time-consuming process.

Machine learning algorithms have been used recently to study the different factors of terrorism [5, 6]. NN and particularly DNN are getting popularity mainly because of the fact that a huge amount of labelled data is available recently. The advancements in computer technologies [79] have been able to create much powerful computer systems to perform the required computation in DNN. In this paper, NN and DNN models are used to make predictions of different factors that lead to terrorist activities. The model is helpful for law enforcement agencies to make prediction before an incident actually happens and potentially causes the loss of precious lives. The predicted factors are explained below.(i)Suicide: to predict whether a terrorist activity is going to be suicide or not.(ii)Success: to predict whether a terrorist activity will succeed or not.(iii)Weapon type: to make a classification of the general type of weapons used in terrorist activity.(iv)Region: to classify the region that will be targeted by the terrorist activity.(v)Attack type: to classify the type of attack carried out as a terrorist activity.

These predictions are important to understand in order to perform counterterrorism. Deep learning can make these predictions efficiently and can help law enforcement agencies to devise mechanisms to deal with terrorists and protect the lives of individuals. With the help of these tools, a terrorist activity can be stopped before it can actually happen and make destructions in terms of lives, infrastructure, or law.

The rest of the paper is organized as follows. Related work is explained in Section 2 to highlight the current state-of-the-art research work in the field. Proposed methodology is explained in Section 3. It also gives a detailed analysis of the dataset, and the architectures of NN and DNN used for the prediction of different factors are explained. Results are demonstrated in Section 4, and the paper is concluded in Section 5 with possible future research directions.

Terrorism can affect a society very badly and can have a huge impact on the people. The topic has been studied extensively over the last few decades to understand its causes and how to develop an effective counterterrorism mechanism to reduce the chances of terrorist activities. Machine learning algorithms and data mining techniques have also been applied to understand the different factors involved in a terrorist activity. In 2004, an adaptive safety analysis and monitoring (ASAM) system developed by Singh et al. [10]at University of Connecticut was discussed. The system used hidden Markov models (HMMs) and Bayesian networks (BNs). The system can detect, track, and predict the potential terrorist activities in real time. The paper has demonstrated the use of the ASAM in analyzing the vulnerabilities at the Athens 2004 Olympics. In 2004, Tranchita et al. had developed a classification model in [11] that includes internal and external, natural and unnatural or man caused events. They have developed a new security analysis methods that predicts events uncertainties.

In [12], Godwin et al. developed a visual analytical approach to effectively identify related entities such as terrorist groups, events, and location based on a 2D layout. The paper demonstrates a sequence comparison from bioinformatics, modified to incorporate the element of time. The paper has claimed that the system reveals relationships between entities that are not easily detectable using traditional methods. In 2009, Ozgul et al. [13] proposed an ensemble framework that can classify and predict terrorist groups using four different classifiers: Naïve Bayes, K-NN, Iterative Dichotomiser 3, and decision stump. The authors demonstrated that ensemble framework has better figures compared to individual models. In 2011, Dixon et al. [14] developed a neural network-based framework for counterterrorism. The authors used a game that is designed by criminologist and psychologists to generate data that can test the suitability of AI techniques to look for counterterrorism. The authors investigated neural network and achieved a 60% success rate to identify deceptive behaviour. In 2014, Pilley [15] predicted terrorist groups using CLOPE algorithm.

In 2016, Toure and Gangopadhyay [16] collected incident data from a real-time system to develop a risk model that calculates the terrorism risk level of different locations. A set of rules was also proposed along with the risk model to make prediction of the future terrorist activities. The paper claims to have an accuracy of up to 96%. In another study by Saha et al. [17] in 2017, the authors predicted attack types, weapon types used, and target types, i.e., type of people where attack is made, using ensemble learning algorithm. The paper has claimed to achieve an accuracy in the range of 79% to 86%. In 2017, Mo et al. [18] focused on the prediction of terrorist events from the GTD with data mining techniques. SVM, Naïve Bayes, and logistic regression were used, and they demonstrated an accuracy of up to 78%. In [19], Ding et al. used machine learning methods (NNET, SVM, and Random Forest) to simulate the risk of terrorist attacks. The model was able to predict the places where terrorist events might occur with a success rate of 96%. In 2017, Garg et al. [20] studied the sentiments and survival of tweets before the terrorist attack on September 18, 2016, on security forces by four different terrorists. Different factors of tweets were taken into account such as last retweet, number of retweets, and number of favorites, which were used to study the sentiments of tweets.

Five different machine learning models, i.e., SVM, ANN, Naïve Bayes, Random Forest, and Decision Trees, were used to make predictions on attack type, attack region, and weapon type in 2018 by Verma et al. [21], reporting an accuracy of around 90%. In 2018, Li et al. [22] predicted the behavior of terrorist groups by presenting a comprehensive framework that uses social network analysis, wavelet transform, and pattern recognition approaches to understand the dynamics of the terrorist group and eventually predict the attack behavior. The paper has claimed that the framework has made accurate prediction of the behavior of the terrorist groups. Zhang et al. [23] in 2018 improved the location recommendation algorithm with multisource factors and spatial characteristics using the data of terrorist attack in Southeast Asia from 1970 to 2016. The model was used to build a spatial risk assessment model of terrorist attacks. The paper has claimed to achieve an accuracy of up to 88%.

In another study by Hao et al. [24], the authors used geospatial statistics that can analyze the spatiotemporal evolution of terrorist attacks in Indo-China. Random Forest is used to predict the risk of terrorist attacks using 15 driving factors. In 2019, Agarwal et al. [25] focused on analyzing the dataset of GTD and made prediction on different factors that might have given a blow to terrorism. Different data mining and machine learning algorithms such as SVM, Random Forest, and logistic regression have been used to understand the dataset and predict different factors such as the success of terrorist attack, the group that was involved in terrorist attack and the effect of different external factors involved in terrorist attack. In 2019, Kalaiarasi et al. [26] developed multiple classifiers to group and predict different terrorist activities using k-NN algorithm and Random Forest techniques. They used the GTD dataset for detection of terrorism. In 2019, Maniraj et al. [27] developed a system that examines the growth or decay of the terrorist groups by the time, location, type of attack, target motives, weapon type, and availability. They analyzed the GTD dataset and used machine learning algorithm that can predict the probability of attacks in different regions. In 2019, Christie in his thesis [28] carried out a study to understand the dynamics of unclaimed terrorism events in Pakistan using machine learning algorithms. They made predictions on terrorist attributes such as attack, target, weapon type, spatial attack, and lethality of attacks. The study made an attempt to match the unattributed terrorist attack to known terrorist groups. In 2019, Ahmad et al. [29] developed a method for detection and classification of social media-based extremist affiliations based on the sentiment analysis. The focus was to classify tweets into two categories: extremist and nonextremist classes. The system uses deep learning-based sentiment analysis to make a classification about the tweets. Other similar studies in 2020 can be found in [3032].

All previous studies have applied machine learning and deep learning techniques to make AI-based model for terrorism. Current state-of-the-art research papers are based on understanding the pattern of terrorism and have proposed different solutions to analyze factors of terrorism. However, no research work is carried out in order to make prediction of future terrorist activities and predict different factors such as success, suicide, weapon type, attack type, and region. Clearly, there is a research gap for modeling and predicting future terrorist activities using deep learning. This research paper compares the performance of traditional machine learning and deep neural networks and concludes that deep neural network is a suitable model for prediction of future terrorist activities.

3. Proposed Methodology

3.1. Data Analysis

In this section, a detailed analysis of the dataset is given. The preprocessing performed on the dataset is also explained.

3.1.1. Feature Selection

The National Consortium for the Study of Terrorism and Responses to Terrorism (START) has prepared a dataset known as Global Terrorism Database (GTD) (https://www.start.umd.edu/gtd). GTD contains information about terrorist activities from 1970 until 2018, including more than 181,000 different instances of terrorism. In this paper, 34 attributes (some attributes are redundant and hence discarded) are taken for the analysis. These attributes along with description are given in Table 1.

3.1.2. Prediction of Different Factors of Terrorist Activities

The following are different factors that neural network and deep neural network will be trained to learn.

(1) Suicide. This field indicates whether the attack is suicide or not suicide. 1 = “Yes” means that the incident was a suicide attack. 0 = “No” means there is no indication that the incident was a suicide attack. Dimension of the dataset is . 90% data is used for training (315,104 instances) and 10% is used for testing (35,012 instances). Both “Yes” and “No” classes have 175,058 instances.

(2) Success. This field indicates the success of a terrorist strike. 1 = “Yes” means that the incident was successful. 0 = “No” means that the incident was not successful. Dimension of the dataset is . 90% of the dataset is taken as training (290,937 instances) and 10% is taken as testing (32,327 instances). Each class has 161,632 instances.

(3) Weapon Type. This field indicates the general type of weapon used in the incident. In the dataset, 13 different labels are used to represent different type of weapon. These labels are explained below.(1)Biological(2)Chemical(3)Radiological(4)Left as blank(5)Firearms(6)Explosives(7)Fake weapons(8)Incendiary(9)Melee(10)Vehicle (not to include vehicle-borne explosives, i.e., car or truck bombs)(11)Sabotage Equipment(12)Other(13)Unknown

Dimension of the dataset is . 90% of the dataset is taken as training (998,200 instances) and 10% is taken as testing (110,912 instances). Each class has 92,426 instances.

(4) Region. This field indicates 12 different regions. These regions are explained below.(1)North America(2)Central America and Caribbean(3)South America(4)East Asia(5)Southeast Asia(6)South Asia(7)Central Asia(8)Western Europe(9)Eastern Europe(10)The Middle East and North Africa(11)Sub-Saharan Africa(12)Australasia and Oceania

Dimension of the dataset is . 90% of the dataset is taken as training (545,119 instances) and 10% as testing (60,569 instances). Each class has 50,474 instances.

(5) Attack Type. This field indicates the general method of attack and broad class of tactics used. In the dataset, 9 different labels are given and are explained below.(1)Assassination(2)Armed assault(3)Bombing/explosion(4)Hijacking(5)Hostage taking (barricade incident)(6)Hostage taking (kidnapping)(7)Facility/infrastructure attack(8)Unarmed assaults(9)Unknown

Dimension of the dataset is . 90% of the dataset is used for training (861,517 instances) and 10% is used for testing (95,725 instances). Each class has 88,255 instances.

3.1.3. Text to Numbers

In the GTD dataset, some features are in text format, for instance, group name, country name, etc. It is not possible to process features with text data in NN or DNN. There exist multiple techniques to convert text data to numbers, e.g., TFIDF, Word2Vec, GloVe, One hot encoding, etc. In this paper, LabelEncoder class of sklearn library is used to convert nonnumeric data to numeric data, as the labels are hashable and comparable to numerical labels.

3.1.4. Missing Data

The dataset contains many missing values, i.e., the cell does not contain any data, which results into NaN when processed by NN. Different interpolation techniques can be used to fill the missing data. In this paper, SimpleImputer of sklearn library is used to fill the missing data. We have replaced the missing values by mean along each column.

3.1.5. Dealing with Unbalanced Classes

During the analysis of the dataset, it is observed that the data are not balanced in different classes. In some classes, there are more instances, while others have very few instances. NN and DNN trained on unbalanced data are biased [33] towards the classes having more instances. In order to keep the data in balanced form, SMOTE: Synthetic Minority Oversampling Technique presented by Chawla et al. in 2002 [34] and later made available as a tool to be used in Python in [35] is used. NN and DNN presented in this paper are trained on balanced data.

3.1.6. Normalization

In GTD, data are in different range. Some columns have values as 0 and 1, while others have values in hundreds or thousands. In this situation, it is difficult for learning algorithm to learn the pattern and converge to a global minimum. Therefore, it is important that before the data are processed by a learning model, the data are normalized, i.e., in the range of 0 to 1 or −1 to 1. In this paper, MinMaxScalar of sklearn library is used, which for each value of the feature subtracts the average of all values and divides it by standard deviation, to convert the data in the range of −1 to 1. The formula of standardization is expressed in equation (1), where are all the samples for a given feature, is the average of all samples by the feature, and is the standard deviation.

3.2. Learning Model

In this section, the learning model used for the prediction of terrorist activities is explained. Two different models are developed. One is based on NN and the other is based on DNN. NN [3638] is a graph of different nodes to perform computation. These nodes are connected with each other by weighted edges. Some of the nodes are classified as input that takes input features and some of the nodes are known as output nodes that make predictions. During the forward propagation, a matrix of weights is multiplied with input features and eventually makes prediction. We have developed five different models. We will explain the process of learning in one model for prediction. There are 34 features, where 33 are input features and 1 is output feature which classifies whether an attack is suicide or not. In order to perform training, we store all data in a matrix. We have instances of terrorist activities; therefore, the size of the input matrix represented by is . In order to train on NN, we need to provide a matrix of the weights with the same size as input features. In case there are 10 units in the first layer, then the size of the weight matrix is . We initialize these weights randomly using Glorot Uniform initializer. We also need to provide a bias represented by . The formula of this multiplication is shown in equation (2), where shows the weights for the hidden layer, shows the bias, and represents the input matrix. There is a nonlinear function, ReLU [39], which is computed as .

For the output layer, we multiply the output of the hidden layer with different weights. Suppose we have 10 units in the hidden layer and one unit in the output layer, then the dimension of the weight matrix is . We also need to add a bias at this layer. The calculation performed at the output layer is shown in equation (3), where and show the weight and bias for the output layer and is the input vector. At the output layer, [40] is computed as

During the training phase of the NN, the prediction is made, represented by as shown in equation (3). Then, the loss is computed comparing the predicted values with actual values. We are using binary cross-entropy loss as shown in equation (4), where represents the number of samples and shows the actual output values. During the backpropagation process, the derivative of the loss is taken for output layer and hidden layer, and weights are updated using optimization techniques, such as gradient descent [41], gradient descent with momentum [42], RMSProp [43], and Adam [44]. The backpropagation with gradient descent is shown in equation (5), where is the learning rate, is the loss function given in equation (4), and and are weights and bias. The algorithm of training of NN model for prediction, with gradient descent optimization algorithm, is given in Algorithm 1.

Input: the whole dataset of GTD along with labels
Output: optimized values of and
Data: GTD Dataset
(1) //Glorot Uniform initializer
(2)while do
(3)
(4) //
(5)
(6) //
(7)
(8)
(9)
(10)
(11)

A sample architecture of NN is given in Figure 2. The figure shows the input layer, which contains the input data. These data are passed to the hidden layer with and as shown in equation (2). The output of the hidden layer is passed to output layer with and and computed as given in equation (3). From the output layer, loss function is computed as given in equation (4). During the backpropagation process, weights are updated, taking into account the error of the actual and predicted , as shown in the following equation:

A DNN [45, 46] has more layers than a single-layer NN. Generally, more than two hidden layers are considered as DNN. A much larger DNN has 100 s of layers. For instance, ResNet [47] has 152 layers. DNN has recently shown advancements in different fields and has achieved state-of-the-art accuracy in different applications given in [4850]. A sample architecture of the DNN is given in Figure 3. The computation of forward propagation in DNN is same as NN. The same computation for one hidden layer is now computed for hidden layers. The output layer computes the results as given in equation (3). Loss is computed as given in equation (4), giving an error of the actual and predicted . During the backpropagation, the values of and for each layer are updated using gradient descent optimization algorithm as shown in equation (5).

The algorithm of DNN is given in Algorithm 2. First, initialization of the weights and biases of all layers is made using Glorot Uniform initializer [51]. Then, in the forward propagation the linear function and nonlinear activation (i.e., ReLU [39]) are computed at each layer. In the last layer, binary cross-entropy loss function is used to compute the loss. In case of binary classification, sigmoid [40] activation function is used, and in case of multiclass classification, softmax [52] is used. Then, during backpropagation, the derivate of the loss function with respect to weights and biases is taken at every layer. The weights and biases are updated using gradient descent.

Input: the whole dataset of GTD along with labels
Output: optimized values of and
Data: GTD Datasets
(1) //Glorot Uniform initializer
(2)
(3)while do
(4)
(5)whiledo
(6)  
(7)  //
(8)  increment by 1
(9) //Binary cross-entropy loss
(10)
(11)whiledo
(12)  
(13)  
(14)  decrement by 1

Gradient descent optimization is explained in Algorithms 1 and 2. But gradient descent is a very basic optimization algorithm and is used only to explain the concept. There are more advanced optimization algorithms, such as gradient descent with momentum [42], RMSprop [43], and Adam [44]. In this paper, we are using Adam optimization for the learning process as it is one of the most effective optimization algorithms for training in deep neural networks. Adam optimization can be expressed mathematically in equation (6), where stores the exponentially weighted average of past gradients with bias correction for layer , calculates exponentially weighted average of the squares of the past gradients for layer , and are hyperparameters that control the two exponentially weighted averages, is the learning rate, counts the number of steps taken for Adam optimization, means the number of layers, and is a tiny value that is added to avoid divide by zero error.

The main objective of this research work is to explore novel techniques in deep learning to understand different parameters such as suicide, success, weapon type, the type of attack, and regions of attack that lead to a terrorist activity. These factors help law enforcement agencies to create strategies for counterterrorism. The deep learning algorithm was used to learn the pattern of this big data available by GTD using most recent optimization techniques and make reasonable predictions and classifications. Even though many researchers have worked in the domain of using AI solutions for counterterrorism, no one has studied an effective mechanism of understanding factors of terrorism using deep learning, which is becoming very popular recently with the increased data and increased computational [53, 54] power. To the best of the authors’ knowledge, no comprehensive work is dedicated to predict and classify factors of terrorism using deep learning algorithms. Therefore, it is sensible to study the problem of predicting future terrorist activities from the perspective of deep learning to demonstrate the full potential of deep neural network.

4. Results

4.1. Experimental Setup on Cluster

The working environment for all experiments in this paper is given in Table 2.

4.2. Architecture of NN and DNN

In the experiments for this paper, the NN consists of one hidden layer having 10 units. The DNN consists of 5 hidden layers. The first layer has 100 units, second layer has 50 units, third layer has 30 units, fourth layer has 10 units, and fifth layer has 5 units. Both models are trained for 500 epochs, using Adam [44] optimizers implemented in Keras with a learning rate of 0.001. Glorot Uniform initializer [51] is used for the initialization of weights and bias. The different combination of number of layers, number of units per layer, optimization technique, etc., is selected based on the random search in the grid. The model is executed using TensorFlow [55] library and hence exploits the parallelism of the cluster.

4.3. Accuracy in Train and Test Datasets

The accuracy of train and test datasets for every iteration computed by NN and DNN is given in Figure 4. The accuracy at 500 iterations for suicide prediction on NN is shown in Figure 4(a) and that on DNN is shown in Figure 4(b). It can be observed that the accuracy in train on DNN is more stable than the NN. Although the accuracy after 500 iterations by NN is very close to DNN, the stability achieved by train and test in DNN is promising and gives better accuracy in different test datasets. The per iteration accuracy in making success prediction in NN is shown in Figure 4(c) and that in DNN is shown in Figure 4(d). NN is not able to make any improvement after 200 iterations, and the accuracy remains around 86%. But in DNN, test accuracy is around 92%. This demonstrates performance improvement by DNN compared to NN. The accuracy on every iteration for weapon type prediction in NN is shown in Figure 4(e). It can be seen that after 100 iterations, the accuracy remains close to 72%. The accuracy in DNN is shown in Figure 4(f), and after 100 iterations, the accuracy is close to 92%. This demonstrates the improvement in accuracy by DNN compared to NN. The accuracy in NN for making region prediction is shown in Figure 4(g). The maximum accuracy achieved is around 80%. However, more than 95% accuracy is achieved in DNN as shown in Figure 4(h). This experiment demonstrates the performance improvements in DNN as compared to NN. The accuracy in attack type prediction by NN is shown in Figure 4(i). As shown in the figure, the accuracy is around 78%. But the accuracy achieved by DNN is around 92% as shown in Figure 4(j). All these experiments demonstrate that as the number of layers is increased, the network is able to learn more complex nonlinearity in the big data and hence able to make predictions efficiently.

4.4. Comparison of Accuracy, Precision, Recall, and F1-Score in NN and DNN

The formulae to calculate accuracy, precision, recall, and F1-Score are given in equation (7). TP means true positive, TN means true negative, FP means false positive, and FN means false negative. The comparison in accuracy in train and test datasets computed by NN and DNN is given in Figure 5. All these experiments demonstrate that DNN is able to achieve an accuracy of more than 91% in both train and test datasets. The maximum accuracy is achieved in suicide dataset, which is around 98%. The comparison of precision, recall, and F1-Score in test data computed by NN and DNN is given in Figure 6. It can be observed that DNN has achieved more than 91% in precision, recall, and F1-Score. This is another demonstration that as the number of layers is increased, the network is able to learn the features in the dataset and is able to make efficient predictions.

4.5. Confusion Matrix

The confusion matrix is a performance measurement in machine learning classification problems. In case of binary classification, the table is showing true positive, true negative, false positive, and false negative. In case of multiclass classifications, the table has size equal to number of classes squared. The confusion matrix computed by DNN for suicide and success is given in Figure 7. The confusion matrix for weapon type, region, and attack type is given in Figure 8. A confusion matrix with large values on the diagonal demonstrate the high accuracy of the model. As shown in these figures, confusion matrix has high values on the diagonals and hence DNN is proved to be an efficient model for making predictions.

4.6. ROC Curve

The ROC (receiver operating characteristic) curve shows the performance of the classification model at classification thresholds. The curve shows two parameters: true-positive rate (TPR) and false-positive rate (FPR). These parameters are defined in equation (8). The ROC computed by DNN in making prediction of suicide, success, weapon type, region, and attack type is given in Figure 9. The ROC shows that DNN is able to make classification with accuracy more than 94%.

4.7. Comparison of NN and DNN with Traditional Machine Learning Algorithms

In this section, the performance of the model based on NN and DNN is compared with traditional machine learning algorithms, i.e., logistic regression, SVM, and Naïve Bayes. The comparison in terms of average train and test accuracy and average precision, recall, and F1-Score is shown in Table 3. These results demonstrate that DNN is the most suitable model for this type of dataset as it is an example of big data, where the performance improves when there is big data and a deeper network. Traditional machine learning algorithms such as logistic regression, SVM, and Naïve Bayes including a single-layer NN are not able to capture the pattern in the dataset, and thus the maximum performance of approximately 84% is achieved. But in DNN, it is possible to achieve 95% accuracy on average.

5. Conclusion

Terrorism is the most important threat to the life of mankind of any time. It can affect the quality of life of not only an individual but the whole society. The fear of terrorism restricts people from contributing in the development of the country. In every country, dealing with terrorism is the top most priority of the government. They seek for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities. Machine learning is an affective model to learn the different factors of terrorism and can be an important tool for law enforcement agencies to deal with terrorism. In this paper, we have investigated AI-based solutions to understand the different factors of terrorism that can help us make prediction in future terrorist activities. We have identified five different factors that are important to predict for counterterrorism. These factors are whether the type of attack is suicide or not, whether the attack is successful or not, what type of weapon can possibly be used, what region can possibly be targeted, and what type of terrorist is going to be used. We have developed different models based on traditional machine learning techniques, but the results have demonstrated that these models are not able to make predictions with high accuracy. We have developed NN- and DNN-based models, and the results have demonstrated that DNN-based models are the most accurate. The model based on DNN has demonstrated more than 95% accuracy compared to other state-of-the-art techniques in machine learning. These deep learning-based techniques can help governments and law enforcement agencies to understand the factors of terrorism and to design strategies to deal with terrorism before a terrorist activity can actually happen.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant no. DF-461-156-1441. The authors, therefore, gratefully acknowledge the DSR for the technical and financial support.