TECHNICAL PAPERS
Mar 1, 2009

Dynamic Bayesian Network for Predicting the Likelihood of a Terrorist Attack at Critical Transportation Infrastructure Facilities

Publication: Journal of Infrastructure Systems
Volume 15, Issue 1

Abstract

This research is motivated by the increased awareness for terrorism related research in the post- 911 era. Transportation infrastructures such as airports, metro and subway systems, bridges, and tunnels are vital to the U.S. economy. Therefore, in the wake of recent terrorist incidents, innovative and robust methods need to be exploited to predict the likelihood of terrorist strikes at critical transportation infrastructure facilities. Since the greater need for predicting future terrorist activities has only been recognized in recent years, the research in this field is in the nascent stages. There are two key aspects to predicting future terrorist activities: (1) developing a reliable and robust prediction model; and (2) analyzing the precision and reliability of available intelligence and other relevant information needed to develop a prediction model. This paper focuses on the first aspect and develops a terrorist attack prediction model (TAPM) using dynamic Bayesian networks (DBNs), which can be used to predict the likelihood of future terrorist activities at critical transportation infrastructure facilities. Theoretical development of the TAPM is presented and the model is employed in two examples to predict a terrorist strike with the possibility of an airplane hijack at a typical U.S. airport. The results suggest that the proposed DBN approach, although more data intensive, may provide a more reliable and better prediction. Since the nature of terrorist strikes is different than natural strikes, a game theoretic approach may be suggested in future works. Moreover, considering uncertainty in data as well as possibility theory in lieu of probability theory are also suggested for future research. This research is the significant first step in terrorist activity prediction at critical infrastructure facilities. Future enhancements to the model for more reliable predictions using real-life attributes are discussed.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This work was motivated by the writer’s summer 2005 work as a research fellow at the START (Study of Terrorism and Responses to Terrorism) Center of Excellence at the University of Maryland, College Park funded by the Department of Homeland Security. The writer thanks his student researcher Kimberly Freeman for her assistance with the literature review while working in the research team at the START center. This work, in part, was completed at the Center for Advanced Transportation and Infrastructure Engineering Research (CATIER) (www.eng.morgan.edu/∼catier) at Morgan State University. Currently, the writer is working on characterizing the influence of geography and terrain in modeling insurgent activities in Iraq. That work is part of Morgan State University’s (MSU’s) Knowledge Integration and Management Center of Excellence (KIMCOE) funded by the Army Research Lab (ARL). Thanks are due to the Dean of the School of Engineering, Dr. Eugene Deloatch who is the Principal Investigator (PI) for the KIMCOE research project. The writer also thanks his KIMCOE research collaborators Dr. LeeRoy Bronner and Dr. Bheem Kattel, and ARL project manager Dr. Dana Ulery. Finally, the anonymous reviewers are thanked for their many valuable comments, which enhanced the quality of the paper.

References

Aliprantis, C. D., and Chakrabarti, S. K. (2000). Games and decision making, Oxford University Press, Oxford, U.K.
Aoki, M. (1987). State space modeling of time series, Springer, New York.
Astrom, K. (1965). “Optimal control of Markov decision processes with incomplete state estimation.” J. Math. Anal. Appl., 10, 174–205.
Bar-Shalom, M., and Fortmann, T. (1988). Tracking and data association, Academic Press, San Diego.
Bengio, Y., and Frasconi, P. (1995). “Diffusion of context and credit information in Markovian models.” J. Artif. Intell. Res., 3, 249–270.
Berger, J. (1980). Statistical decision theory: Foundation, concepts, and methods, Springer, New York.
Berger, J. (1985). Statistical decision theory and Bayesian analysis, Springer, New York.
Charniak, E. (1991). “Bayesian networks without tears.” AI Mag., 12(4), 50–63.
Cowell, G. C., Dawid, A. P., Lauritzen, S. L., and Spiegelhalter, D. J. (1999). Probabilistic networks and expert systems, Springer, New York.
Dahlhaus, R. (2000). “Graphical interaction models for multivariate time series.” Electro- Magnetobiol., 51, 157–172.
Dean, T., and Kanazawa, K. (1989). “A model for reasoning about persistence and causation.” Artif. Intell., 93(1–2), 1–27.
Dean, T., and Wellman, M. (1991). Planning and control, Morgan Kaufmann, San Francisco.
Durbin, J., and Koopman, S. J. (2001). Time series analysis by state space methods, Oxford University Press, Oxford, U.K.
Gamez, J. A., Moral, S., and Salmeron, A., eds. (2004). Advances in Bayesian networks, Springer, New York.
Goldstein, H. (2006). “Modeling terrorists.” IEEE Spectrum, 43(9), 26–34.
Hamilton, J. (1994). Time series analysis, Wiley, New York.
Harvey, A. C. (1989). Forecasting, structural time series models, and the Kalman filter, Cambridge University Press, Cambridge, U.K.
Helm, L. (1996). “Improbable inspiration.” Los Angeles Times, Oct. 28, ⟨http://www.ar-tiste.com/latimes_oct-96.html/⟩ (July 13, 2005).
Higashi, M., and Klir, G. J. (1983). “Measures of uncertainty and information based on possibility distributions.” Int. J. Gen. Syst., 9(1), 43–58.
Hudson, L. D., Ware, B. S., Laskey, K. B., and Mahoney, S. M. (2003). “An application of Bayesian networks to antiterrorism risk management for military planners.” ⟨http://u2.gmu.edu:8080/dspace/bitstream/1920/268/1/Antiterrorism.pdf⟩ (July 13, 2005).
Jansen, R., et al. (2003). “A Bayesian networks approach for predicting protein-protein interaction from genomic data.” Science, 302, 449–453.
Jasen, F. V. (2001). Bayesian networks and decision graphs, Springer, New York.
Jelinek, F. (1997). Statistical methods for speech recognition, MIT Press, Cambridge, Mass.
Jha, M. K. (2006). “Applying Bayesian networks to assess vulnerability of critical transportation infrastructure.” Applications of Advanced Technology in Transportation, Proc., 9th Int. Conf., K. C. P. Wang, B. L. Smith, D. R. Uzarski, and S. C. Wong, eds., ASCE Press, Reston, Va., 1–5.
Jha, M. K., and Marroquin, O. (2006). “A dynamic Bayesian network for hurricane planning and preparedness.” Proc., 7th Int. Congress on Advances in Civil Engineering (CD-ROM), Paper No. ace06–566, Yildiz Technical Univ., Istanbul, Turkey.
Kikuchi, S., and Chakroborty, P. (2006). “Place of possibility theory in transportation analysis.” Transp. Res., Part B: Methodol., 40, 595–615.
Klir, G. J. (2002). “Uncertainty in economics: The heritage of G. L. S. Shackle.” Fuzzy Economic Review, VII(2), 3–21.
Laskey, K., et al. (2004). “Detecting threatening behavior using Bayesian networks.” Proc., Conf. on Behavioral Representation in Modeling and Simulation ⟨http://ite.gmu.edu/~klaskey/papers/BRIMS04_InsiderThreat.pdf/⟩ (July 13, 2005).
McCallum, A. (1995). “Reinforcement learning with selective perception and hidden state.” Ph.D. thesis, Univ. of Rochester.
Meek, C., Chickering, D. M., and Heckerman, D. (2002). “Autoregressive tree models for time-series analysis.” Proc., 2nd Int. SIAM Conf. on Data Mining, 229–244.
Murphy, K. P. (2002). “Dynamic Bayesian networks: Representation, inference and learning.” Ph.D. thesis, Dept. of Computer Science, Univ. of California, Berkeley.
Nicholson, A. E., and Brady, J. M. (1994). “Dynamic belief networks for discrete monitoring.” IEEE Trans. Syst. Man Cybern., 24(11), 1593–1610.
Niedermayer, D. (1998). “An introduction to Bayesian networks and their contemporary applications.” ⟨http://www.niedermayer.ca/papers/bayesian/⟩ (Dec. 30, 2005).
Parker, A. (2001). “Sensing for danger.” Science and technology review, July/August, 11–17, Lawrence Livermore National Laboratory, ⟨http://www.llnl.gov/str/JulAug01/pdfs/07 01.2.pdf⟩.
Pearl, J. (2000). Causality: Models, reasoning and inference, Cambridge University Press, Cambridge, U.K.
Ron, D., Singer, Y., and Tishby, N. (1996). “The power of amnesia: Learning probabilistic automata with variable memory length.” Mach. Learn., 25, 117–149.
Ross, S. (1987). Introduction to probability and statistics for engineers and scientists, Wiley, Toronto, Canada.
Sanghai, S., Domingos, P., and Weld, D. (2005). “Relational dynamic Bayesian networks.” J. Artif. Intell. Res., 24, 1–39.
Smets, P. (1998). “Theories of uncertainty.” Handbook of fuzzy computation, R. E. Ruspini, P. P. Bonissone, and W. Pedrycz, eds., Institute of Physics Publishing, Bristol and Philadelphia, 1.2.1–1.2.9.
Spanbauer, S. (2003). “Internet tips: Purge unwanted spam the 18th-century way.” ⟨http://www.pcworld.com/article/112478/internettipspurgeunwantedspamthe18thcenturyway.html⟩.
Sun, Z., Ee-Peng, L., Chang, K., Teng-Kwee, O., and Gunaratna, R. K. (2005). “Event driven document selection for terrorism information extraction.” IEEE Intelligence and Security Informatics, 3495, 37–48.
Von Neumann, J., and Morgenstern, O. (1947). Theory of games and economic behavior, Princeton University Press (1944, revised 1947), Princeton, N.J.
Wan, E. A., and Van der Merwe, R. (2001). “The unscented Kalman filter.” Kalman filtering and neural networks, S. Haykin, ed., Wiley, New York.
West, M., and Harrison, J. (1997). Bayesian forecasting and dynamic models, Springer, New York.
Wikipedia. (2005). ⟨http://en.wikipedia.org/wiki/Bayesian_network/⟩ (July 13, 2005).
Winkler, R. L. (2003). Bayesian inference and decision, 2nd Ed., Probabilistic Publishing, Gainesville, Fla.
Zellner, A. (1971). An introduction to Bayesian inference in econometrics, Wiley, Toronto, Canada.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 15Issue 1March 2009
Pages: 31 - 39

History

Received: Mar 3, 2006
Accepted: Jun 15, 2007
Published online: Mar 1, 2009
Published in print: Mar 2009

Permissions

Request permissions for this article.

Authors

Affiliations

Manoj K. Jha, M.ASCE [email protected]
Associate Professor and Director, Center for Advanced Transportation and Infrastructure Engineering Research, Dept. of Civil Engineering, Morgan State Univ., 1700 East Cold Spring La., Baltimore, MD 21251. E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share