This document discusses research analyzing criminal networks in Brazil using network analysis techniques. The researchers collected data on over 15,000 criminal individuals and their relationships, creating a network of over 9,000 nodes and 19,000 links. Analyzing the network, they identified 93 distinct criminal modules. The researchers then applied various attack strategies to the network, such as targeting high-betweenness or high-degree nodes, and found that targeting inter-module links using a module-based attack strategy was the most effective at fragmenting the network.
1. Requião da Cunha B,
PhD student - UFRGS
Brazilian Federal Police Agent
Fast Fragmentation of Networks
Using Module-Based Attacks
http://dx.doi.org/10.1371/journal.pone.0142824
Gonçalves Sebastia,
Proffesor - UFRGS
González-Avella JC,
IFISC.
23. Fig 2. Comparison between the effect of betweenness-based attack, degree-based attack,
longest path attack, random attack, and module-based attack network.
24.
25.
26. Fig 4. Size of the biggest connected component in terms of the initial size, σ, as function of
fraction of removed edges, ρ.
27. Fig 6. Overall efficiency gain (η) of the MBA method
relative to the CBA method as function of modularity,
Q, for nodes and edges removal.
The vertical axis is in logarithmic scale and the
horizontal axis is linear. The networks attacked are
Facebook (FB), Twitter (TW), Google Plus (G+), US
power grid (PG), Euro road (ER), Open flights (OF),
US airports (UA), Yeast protein (YP), H pylori (HP),
and C elegans (CE).
Modularity and the fraction of
bridging links.