Abstract
This paper aims to select the appropriate node(s) to effectively destabilize the terrorist network in order to reduce the terrorist group’s effectiveness. Considerations are introduced in this literature as fuzzy soft sets. Using the weighted average combination rule and the D–S theory of evidence, we created an algorithm to determine which node(s) should be isolated from the network in order to destabilize the terrorist network. The paper may also prove that if its power and foot soldiers simultaneously decrease, terrorist groups will collapse. This paper also proposes using entropy-based centrality, vote rank centrality, and resilience centrality to neutralize the network effectively. The terrorist network considered for this study is a network of the 26/11 Mumbai attack created by Sarita Azad.
Keywords
Introduction
The problem facing old history is the threat to human civilization from extremists. Technological development has enabled the common people to rise and adversely affect society with the advanced techniques of these inhuman individuals. Law-enforcement agencies seek to deter potential attacks in this context. It is a reason to study and identify terrorist networks. Another effective solution is that law enforcement authorities utilize data mining. Social Network Analysis (SNA), which studies terrorist networks to recognize connections and relationships that may reside among terrorist nodes, is one such data mining method.
Social Network Analysis (SNA) uses the framework hypothesis to disrupt social networks between interpersonal organizations. The project includes hubs (performers, individuals, relationships, etc.) within the system and interactions between hubs (community, family relationships, conversation, money exchange, etc.). Social interactions can be attributed to informal, disconnected organizations (such as companionship, family relationships, correspondence, trade, and many more) or online interpersonal organizations (such as Facebook, Twitter, etc.). Different SNA steps were taken to talk to onscreen characters, inspect strong or weak relations, recognize key/focal actors and subgroups in the system, and detect topology and system consistency. Late SNA has become a standard in variousfields.
Soon after the 9/11 terrorist attack, SNA’s intensity in combating terrorism became prevalent. The SNA is broadly used across information and law enforcement agencies to comprehend and cover pioneers in terrorist and behavioral oppressor processes for the structure and processes of terrorism operations. In counter-terrorism, some common uses of SNA include key player detection, group exploration, interaction analysis, onscreen nodes (discovery personality) and dynamic network assessment, etc. [1].
Terrorist activity is the unlawful act of a certain number of citizens who take many innocent people’s lives. Families and children are deeply affected by systematic brutality, terrorism, and mental distress in the community, such as gunning down, killing civilians, or other attacks. An in-depth analysis of these terrorist attacks shows that people from various countries form a broad-based organization that works on different network layers, and these networks are also of different categories [2, 3].
As underground networks share certain features with civilians (explicit nodes), it is challenging to identify as they conceal their activities. Moreover, the secret/terrorist networks are now merged into many people’s lives, which is a potential problem that causes uncertainty in decision-making. Therefore, it is essential to develop tools to precisely identify people in underground networks to deal with uncertainty and use them more effectively to destabilize them [4].
Soft set theory was introduced by Molodtsov in 1999 [5] as a novel mathematical method for coping with uncertainties. Unlike conventional tools for coping with uncertainty, such as probability theory, fuzzy set theory [6], and rough set theory [7], the strength of soft set theory is that it is not constrained by the inadequacy of those theories’ parametrization tools.
In the past few years, in different engineering fields like forecasting [8], sound quality checking [9], supplier selection [10], simulation and modelling [11], decision making [12, 13], and data analysis [14], almost everywhere, soft set and fuzzy soft set theories have established their presence and applicability. However, with the same fuzzy soft-set decision-making dilemma, numerous results from different assessment bases and adequate level soft sets can be derived, making it hard for policymakers to determine which one is the optimal option. Thus, the most critical problem in solving such a sparse fuzzy soft-set related issue in decision-making [15] is to decrease the uncertainty created by individual personal reasoning to increase the degree of decision-making.
Dempster–proof Shafer’s principle (D-S principle) is defined as an optimal computational intelligence model to fuse information. Dempster first proposed the idea in 1967 [16], then perfected its current incarnation in 1976 [17] through his colleague Glenn Shafer. The principle of evidence could address and manage uncertainty differently than the theory of probability [18]. Dempster’s combination rule is the essential D-S theory instrument, with many essential numerical characteristics, such as associativity and commutativity [19]. The principle of evidence has been adapted all across today, like objective identification [20], decision-making [21], reliability study [22], etc. The ambiguity measure indicates proof of consistency or accuracy. Ambiguity measurement (AM) [23] is a simple way to represent uncertainty, which is sensitive to changing facts. AM was extensively used for decision-making challenges [24].
The methodology proposed here in this article is taken from Fuyuan Xiao’s work in the year 2020 [25], in which the author proposed integrating Dempster-Shafer’s theory with belief entropy Multi-Criteria Decision Making called EFMCDM. Each criterion is represented as evidence in this approach, and all possible alternatives are assembled as the frame of discernment within the context of Dempster-Shafer’s theory. The EFMCDM approach takes both subjective and objective weighting into account when solving MCDM problems to produce more suitable Basic Probability Assignments (BPAs) for the criteria.
Therefore, this article introduced a novel method, an integrated fuzzy soft set system of the Dempster–Shafer evidence principle and the ambiguity measures, to achieve a more precise decision of terrorist nodes to destabilize their network. The 26/11 Mumbai Attack dataset is considered for testing this approach and measuring the effectiveness of the neutralization of terrorist networks.
The paper is structured as follows: Passage 2 contains the Fuzzy Soft Set Preliminaries, the D-S Theory of Proof, and the Weighted-Averaging Combination of Evidence Law and Uncertainty Measure; Passage 3 contains the methodology. A method was applied to the 26/11 Mumbai attack dataset in Passage 4 to determine the necessary node (s) to delete and neutralize the network; The efficacy and efficiency of the suggested solution discussed in Passage 5; finally, the conclusion discussed in Passage 6 of this report.
Primaries
Most of the preliminaries of the fuzzy soft set, D-S Theory, evidence combination rule, and AM are briefly presented below in this segment.
Fuzzy soft set
Where P(U) is U’s power set.
Let us take the following example to demonstrate this concept,
Where,
In two-dimensional computer representation used to store the soft set (A, C), where for all entries t ij , would be l ij = 1, if l i ∈ A (c j ), l ij = 0 if not. Table 1 displays a table representing the soft set (A, P), which interprets that the terrorist l2 has a higher probability of getting selected to eliminate from the network so that the network efficiency will decrease effectively.
Soft set table of the application domain
Let, object o fits into criteria c with membership value A (c) (o). Then determination of A (c) given below:
Table 2 shows the fuzzy soft set (A, C).
Fuzzy soft set table of the application domain
where n number of criteria and A (c i ) (o t ) is a membership value of the terrorist node o t for the criteria c i . If we have two methods, then the high value of ΨM for the respective method will have better performance, compared to others.
Let,
Basic Probability Assignment (BPA):
That satisfies,
Body of Evidence (BOE): If m (X) > 0, X is known as the focal point. Set of all BOE focal elements.
Dempster’s combination rule for combined evidence: if multiple independent BOE’s are available, then Dempster’s combination rule can be determined as follows:
where X
i
∩ X
j
= X and
Here K is an evidence conflict measure.
Combination rule table for example 3
Expert-1
Expert-2
The combined probability is evaluated as follows: T1 = 0.35/(1-(0.05 + 0.1 + 0.14 + 0.04 + 0.21 + 0.03))= T2 = 0.02/(1-(0.05 + 0.1 + 0.14 + 0.04 + 0.21 + 0.03))= T3 = 0.06/(1-(0.05 + 0.1 + 0.14 + 0.04 + 0.21 + 0.03))=
Belief (lower bound): Given
Plausibility (upper bound): Given
The uncertainty of
Plausibility, Belief, and uncertainty result
Sometimes, when BOE’s have high conflict, the maximum chance is that Dempster’s combination rule will give illogical results [29, 30]. Deng et al. [31] and Fuyuan Xiao et al. [32] have implemented a new Weighted-Averaging combination rule to deal with this problem.
Evidence distance (dest
ij
): Let, m
i
and m
j
Are two BPA’r t universe
Similarity Measure (S
ij
): Let, m
i
and m
j
are two BPA’s under the universe
Similarity Measure matrix (SimM): The agreement between BOE’s, m
i
(i = 1, 2, …, k) represented in similarity measure matrix given below,
Support Degree (SD
m
i
): Support degree of evidence can be determined as follows:
Information Volume (I
m
i
): The Belief entropy Π
m
i
of the BPA m
i
(i = 1, 2, …, k) can be determined as follows:
Normalized Information volume,
Credibility Degree (CD
m
i
): Credibility degree of evidence can be determined as follows:
Modified Credibility Degree (MCD
m
i
): Modified Credibility degree of evidence can be determined as follows:
Normalized modified credibility degree,
Weighted Averaging evidence combination (W
m
): It can be determined as follows:
When there are k parts of the evidence, the classical Dempster’s rule Equation (5) can be used to aggregate the weighted mass average of k-1 times.
The disadvantages of measurement in aggregate uncertainty a overcome using the Ambiguity measure (AM). Let,
where pignistic distribution (BetP
m
(a)) [34] can be fined as follows:
Table 5 shows the result of the ambiguity measure for E1 and E2.
Result of ambiguity measure for E1 and E2
Social network analysis (SNA)
Entropy-based centrality [35]
The final relational entropy centrality RE
i
is,
The Vote Rank is an incremental technique to assess the best spreadable potential for a group of decentralised spreaders. With this method, each spreader voting node would reduce the voting power of neighbours of the selected spreader [37].
Initialize the tuple (S
i
, V
a
i
) as (0, 1) Vote: Nodes vote for their neighbours, while their neighbours vote. Each node’s voting score is decided after the vote. Note that the voting module is set to 0 if it was previously appointed to avoid re-election. Select: Pick the v
max
is a node that receives the maximum votes compared to the vote scores determined in Phase 2. This node may not engage in following rotations of voting, i.e., va
v
max
may not be able to vote at all from now. Update: The voting power of the nodes that voted for v
max
Phase 2 is weakened. Repeat Phase 2 through 4 before r spreaders are selected.
Method of destabilization of terrorist network
Let, Alternatives x
i
(i = 1, 2, …, s) is a set of Terrorist node(s) in a terrorist group, c
j
(j = 1, 2, …, n) are set of criteria such as Entropy-based centrality, Resilience centrality, and VoteRank centrality, which are parameters considered.
Step 1. Find the fuzzy soft set matrix
Step 2. Construct the normalized matrix
Step 3. Calculate the uncertainty of each criterion c
j
(j = 1, 2, …, n) using Equation (19) denoted as
Step 4. Normalize t Uncertainty
Step 5. Determine BPAs for each terrorist node(s) x
i
(i = 1, 2, …, s) and
For each j,
Step 6. Calculate Pearson correlation [38] for each terrorist node(s) x
i
(i = 1, 2, …, s) and
Step 7. Determine the support degree for each Terrorist node(s) using Equation (11).
Step 8. Determine credibility degree for each Terrorist node(s) using Equation (14).
Step 9. Determine Normalized Information volume (believe entropy) for each Terrorist node(s) using Equation (12-13)
Step 10. Determine the Normalized Modified credibility degree for each Terrorist node(s) using Equation (15-16).
Step 11. The final BPA from each terrorist nodes x i (i = 1, 2, …, s) could be obtained, which is explicitly regarded as a measure of confidence of each terrorist node(s) x i (i = 1, 2, …, s). Rank the competitor terrorist node’s belief indicators and get the best terrorist node(s). Optimal choices can have more than one terrorist node when more nodes equate to the optimum.
26/11 Mumbai dataset description 1
A team of terrorists recognizes the incident as one of India’s most significant terrorist attacks on 26 November 2008. The dataset consists of 13 terrorists (nodes), where ten terrorist operatives came to India for terrorist activities. The remaining three were in Pakistan and managed the terrorist activity. Zaki-Ur-Rehman Lakhvi and Kaahfa, including some senior LeT members, watched the terrorist group closely. The terrorist nodes are linked through a Guided Diagram with 13 nodes and 31 communication links. Some terrorist nodes are closely linked, while some nodes are highly external. Figure 1 depicts the terrorist communications matrix link network [39] involved in Mumbai Terrorist Attack 26/11, framed with the UCINET tool’s help [40].

A network representation of the Mumbai terrorist attack on 26 November 2008.
Step 1. Construct the three columns matrix to demonstrate the criteria for decision-making. By the following the definitions of Sections 3.1.1, 3.1.2, and 3.1.3, respectively, values for three columns were evaluated, as shown in Table 6.
Centralities calculated using equations in Sections 3.1.1, 3.1.2, and 3.1.3, respectively
Centralities calculated using equations in Sections 3.1.1, 3.1.2, and 3.1.3, respectively
Step 2. Normalize the values matrix values column-wise and resultant values shown in Table 7.
Normalize parameters values
Step 3. Calculate the uncertainty for each parameter; the result is shown in Table 8.
Representation of
Step 4. Evaluate the degree of uncertainty for each parameter, the result shown in Table 9.
Representation of
Step 5. Calculate the BPA’s m c j (x i ), for each Terrorist node(s), The result represents in Table 10.
Representation of m c j (x i )
Step 6. Generate the similarity matrix of size s × s using BPAs of each terrorist node(s). The result is shown in Table 11.
Similarity measure matrix for all BPA’s 2
Step 7. Determine the support degree using Equation (32). The result is shown in Table 12 and Fig. 2.
Support degree of each terrorist node

Support Degree of each terrorist node.
Step 8. Determine the credibility degree CD m i . The result is shown in Table 13 and Fig. 3.
Credibility degree of each terrorist node

Credibility degree of each terrorist node.
Step 9. Determine the Normalised information volume
Normalized information volume

Normalized information volume.
Step 10. Determine the Normalized Modified credibility degree
Normalized modified credibility degree

Normalized modified credibility degree.
Step 11. Finally, select the node with a high degree of modified credibility and direct neighbouring nodes with the most nearer credibility degree value to destabilise the network and eliminate them from the terrorist network. Table 16 and Fig. 6 shows the selected node to destabilise the network.
Final selection of potential nodes for destabilization

Final selection of potential nodes for destabilization.
In our proposed steps, we will assess the influence of individuals in two ways. First, without the isolated individual, we can contrast the relative resource congruence of the terrorist network. Second, we can compare the relative performance changes with and without these individuals regarding cluster coefficient, distribution, and capacity to respond to this shift for the terrorist network [41].
Clustering coefficient
The clustering coefficient is beneficial to knowledge dissemination [42]. The more significant clustering coefficient allows the structure to be transparent and allows the development of reputations and cooperation standards [43]. In a high cluster, the network’s coefficient, cooperative or non–cooperative activity, can rapidly spread to other network members, influence their future willingness to cooperate, exchange information more positively, and encourage knowledge-sharing [44].
Where C i = 0 for a node with degree wither 0 or 1. Figure 7 shows the clustering coefficient of individuals.

The clustering coefficient of individuals.
The Average clustering coefficient [45] for the whole network can be determined as follows:
The Average Clustering Coefficient of the network before and after the isolation of selected node for destabilization and compared with the existing method shown in Table 17, which prove the correctness of our hypothesis that after eliminating the selected terrorist node(s) from the network, it will decrease the network efficiency by the mean of decrement in behaviour transfer or information spreading.
Average clustering coefficient of the network before and after the isolation of selected node for destabilization
The efficiency of information diffusion represents the pace and consistency of the exchange and distribution of knowledge through the entire network [47].
Table 18 and Fig. 8 show a drop in knowledge diffusion. Here the value nearer to 1 interprets that higher drop-in network efficiency.
Drop–in knowledge diffusion

Impact of destabilization.
This paper analyzes the effect of fuzzy soft-fitting destabilization strategies on the 26/11 Mumbai Attack terrorist network. The fuzzy soft set concept played a prominent role in ranking the network nodes based on some parameters considered here with more accuracy and dealt with uncertainty positively. The results indicate that the terrorist network as distributed subnetworks is challenging to destabilize. The outcome shows that the only way to destabilize the network is to isolate the emerging leaders in the short term. The D-S Theory of Evidence plays a novel role in identifying the top five players in the terrorist network using the concept of weighted-averaging combination rule. Here we utilized a few novel centralities like entropy-information-based centrality, resilience centrality, and vote rank centrality for objective criteria selection to increase the accuracy of the proposed approach. The analysis of the results demonstrates the efficacy of our approach through knowledge diffusion within the network. Furthermore, it was discovered that after eliminating the selected node (s) for terrorist network destabilization, both the clustering coefficient and network efficiency decreased.
Most central nodes’ cost of isolation might be high, so future work should concentrate on destabilizing the network by eliminating the foot soldiers from the network, not the key player. So, the cost of destabilization can get reduced, and the approach’s impact would be more effective.
Conflict of interest
The authors declare no conflict of interest.
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
