首页 | 本学科首页   官方微博 | 高级检索  
     检索      

暗网环境下恐怖主义信息挖掘与分析
引用本文:谢玲.暗网环境下恐怖主义信息挖掘与分析[J].国际展望,2021(3):135-151,157,158.
作者姓名:谢玲
作者单位:西南政法大学总体国家安全观研究院 重庆 401120
基金项目:2020年西南政法大学总体国家安全观研究院生物安全风险防控和治理体系建设专项研究课题“城市生物恐怖袭击AHP潜在攻击风险模型及防控策略研究”(JS-ZTGJAOG-005)的阶段性成果。
摘    要:随着互联网和人工智能的快速发展,恐怖主义活动方式变得更为隐秘。网络恐怖主义活动空间从表网的在线社区与视频分享平台转向暗网黑市交易和暗网论坛。针对暗网节点通信和交易信息高度匿名等特点,相应的反恐工作需要采取新的技术手段,以深度切入恐怖分子用于扩大影响的暗网空间。为此,可以设计和优化专门适用于暗网的聚焦爬虫工具,挖掘恐怖主义活动信息;可以搭建涉恐事件数据模型,分析恐怖组织可能的线下攻击手段;可以利用社会网络分析和超链接分析方法,定位暗网内恐怖主义隐蔽社区和危险用户集群。通过准确把握暗网中的匿名恐怖主义活动规律,抓住安全监控与防范的重点、难点,综合施策,以及适时制定和精准实施反恐网络安全策略,能够最大限度遏制暗网恐怖主义的危害,保护国家安全和人民利益。

关 键 词:恐怖主义  暗网  "洋葱"路由器  爬虫工具  社会网络分析

Terrorism Information Mining and Analysis in the Dark Web
XIE Ling.Terrorism Information Mining and Analysis in the Dark Web[J].World Outlook,2021(3):135-151,157,158.
Authors:XIE Ling
Abstract:With the rapid development of the Internet and artificial intelligence,there are more underground terrorist activities than ever.The forms of cyber-terrorist activities have changed from online and offline campaign,recruitment,trading and financing to social media interactions such as Facebook,Instagram,Twitter,and YouTube.Terrorists are now more active in the dark web black market and dark web forums than online communities and video-sharing platforms.As anonymity of communication and transaction is the most important characteristic of the dark web,anti-terrorism efforts need to adopt new technological means to penetrate deeply into the dark net space used by terrorists.Thus,the focused crawler especially for the dark web could be used to track terrorist activities and other information.Hypothesis theory and game theory could be used to build the data model of terrorism-related events to analyze the possible offline attacks.Social network analysis and hyperlink analysis could be adopted to locate terrorist hidden communities and dangerous user clusters in the dark web.By learning the patterns of anonymous terrorist activities in the dark web,identifying the difficulties in monitoring and prevention,China could take comprehensive measures,and timely formulate and accurately implement anti-terrorism network security policies.In this way,dark web terrorism could be contained to the maximum extent while the national security and people’s interests will be secured.
Keywords:terrorism  dark net  onion router  crawler tool  social network analysis
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号