International Journal of Statistics and Applications
p-ISSN: 2168-5193 e-ISSN: 2168-5215
2016; 6(6): 361-367
doi:10.5923/j.statistics.20160606.04

Zaher Khraibani , Hussein Khraibani
Department of Applied Mathematics, Lebanese University, Faculty of Sciences, Beirut, Lebanon
Correspondence to: Hussein Khraibani , Department of Applied Mathematics, Lebanese University, Faculty of Sciences, Beirut, Lebanon.
| Email: | ![]() |
Copyright © 2016 Scientific & Academic Publishing. All Rights Reserved.
This work is licensed under the Creative Commons Attribution International License (CC BY).
http://creativecommons.org/licenses/by/4.0/

The terrorism attack became the first security world problem in the 21st century which the most terrorist attacks threaten civilians. The aim objective of this article is to develop the self-exciting point process to show that the terrorist attacks often follow a general pattern that can be modeled to study the evolution of the terrorism attack by using a statistical model especially the Hawkes process. The basic idea of this process is that the some events don’t occur independently; when a certain event happens. This model is a unique statistical model in literature which it is a special class of point process where the background rate is non-stationary.
Keywords: Terrorism events, Point process, Self-Exciting, Hawkes process, Prediction
Cite this paper: Zaher Khraibani , Hussein Khraibani , Self-Exciting Point Process to Study the Evolution of the Attack Terrorism, International Journal of Statistics and Applications, Vol. 6 No. 6, 2016, pp. 361-367. doi: 10.5923/j.statistics.20160606.04.
![]() | Figure 1. Concentration and intensity of the terrorist attacks in 2015 in the world |
![]() | Figure 2. Attacks and deaths by region in 2015 |
which that takes values on
and the occurrences arrival times
of each attack terrorism events. We say that a point process
is orderly if for any time 
A point process is typically characterized by prescribing its conditional intensity
, which represents the infinitesimal rate at which events are expected to occur around a particular time
given the history of the process up to
(Ogata, 1988) [14], denotes the history of events prior to time 
Notice that since the right hand side is a conditional expectation,
is a random variable. An important example of a point process is the Poisson process.
represents the number of events occurring between time
and
Given disjoint sets
where
is a Poisson process if the finite dimensional distributions
each have a Poisson distribution and are independent. Notice that a Poisson process always has a deterministic conditional intensity
If the process is stationary then
is a constant.We say that a point process
is self-exciting if
for any
This means that if an attacks terrorist event occurs, another event becomes more likely to occur locally in time and space. This is not the case for a Poisson process which it has independent increments so
. Although Poisson processes have many properties which make them particularly well suited for special purposes, they cannot capture interaction effects between events. So, for this reason we investigate in the next section, a specific class of point process noted a Hawkes Process.![]() | (1) |
is the normal counting measure (Hawkes & Oakes, 1974) [15] and
is the baseline intensity or the rate of events,
denote the points, or event times, of the point process, and
is the excitation function. (Zhuang, Ogata, & Vere-Jones, 2002) [16]. The summation describes the self-exciting part of the process with the components
and
represents the linear dependency over the past events. Many choices for the triggering density
have been used (Hawkes, 1971; Ogata, 1988) [3]. In the univariate model of the Hawkes process there is a response function we use an exponential distribution Egesdal et al. (2010) [17] that takes the form of the model (1):![]() | (2) |
before the exponential term is the normalization constant. In behavioral terms,
corresponds to the strength of the drive to seek retribution for a previous attack, and
represents the average time until a repeat event occurs. The intensity function of the univariate Hawkes process in the case of terrorism is usually used to predict the rate of attacks.The figure 3 indicates that a stationary background rate
is unrealistic for this reason we consider a non-stationary background rate
Egesdal et al. (2010) [7], Ogata (1998) [14]. The simplest choice for a non-stationary
is a step function parameterized by three values
and
So we obtain the following model:![]() | Figure 3. Hawkes process with an exponential intensity |
![]() | (3) |
We choose
and
based on visual inspection of where the largest jumps is occur and we consider the values of 
and
are held constant while fitting the other model parameters.In this article the number of the attacks terrorist increase, for this we consider another model with a linear rate increase. In this case we obtain the following model:![]() | (4) |
For stationary, it is also assumed that
By the above specification, we note in particular that the occurrence of an event will make the intensity process jump instantly by the amount
which implies an increased chance of another event occurring in a short time interval following the event. This makes the self-exciting process an amenable model for recurrent event data with temporal clustering of events. In applications, two popular choices of the excitation function are the exponential decay function
with parameters
and the polynomial decay function
with parameters
and
With the corresponding constraints on the parameters, these two forms of the excitation function are both decreasing. From a practical point of view, it seems reasonable to assume that the residual excitation effect due to an individual event wears out and diminishes toward zero as time elapses. However, more specific assumptions, such as the exponential and polynomial forms, for the excitation function are not always justified. The terrorism attack model is a particular type of marked Hawkes process for modelling the number and the times of any attacks terrorism. We noted by
the number of the attack occurring at time
The idea behind using the following model is that the terrorism attack is reflected in the fact that every new attack increases the intensity by
For this reason the models (1), (2) and (3), (4) can be defined by:![]() | (5) |
are parameters, and the exponential density distribution is defined by
Equivalently we could define it by its conditional intensity function including both marks and times:![]() | (6) |
(Silverman, 1986) [21]. We use variable bandwidth kernel smoothing to construct a smoothed version of the data:
Where
We note by
the maximum of the
nearest neighbor and by
the minimum bandwidth. We know that the rate
represent the total of events for this we introduce the parameter
So we obtain the following model: ![]() | (7) |
and
is affected by the choices of the
nearest neighbor and the bandwidth. To estimate the parameters, we use maximum likelihood estimation [19], [20]. We obtain for the linear model the log likelihood function:
We use the Akaike’s Information Criterion (AIC) to compare the models where the
[18] where
is the number of parameters in the model and
is the maximum value of the likelihood function. Egesdal et al. (2010) [17] compare a self-exciting model to a stationary Poisson process with rate equal to the average number of events over the time interval in consideration. In the next section we estimate the parameters of the model by the likelihood method.
We apply the maximum likelihood inference or the Bayesian inference which we obtain a simplicity expression of the process. We consider the observed point
on an observation interval
the likelihood function is given by:
Given a marked point
the likelihood function becomes:
By definition, the likelihood function is the joint density of all observed points 

appears since the unobserved next point for example
must appear after the end of the observation interval. We assume that the conditional intensity function can be defined by the hazard function:
And
Where
is the last point before
So we replace
and
in
we obtain:
Where
This result for the unmarked case. To obtain for the marked case, start by the factorization:
Same demonstration in the unmarked case, we obtain:
Which establishes the result for the marked case.Given the occurrence observations
for an interval
the log-likelihood of a point process with an intensity function
given in equation (1):
Where
This is the familiar expression
in the case of constant rate. The above log-likelihood is defined under the assumption that the occurrence observations are observed from time
to a given time
. However in most identification problems, only
are given and
is not specified. We assume in this article
and
So the log -likelihood function for the specified intensity function is:
Exchanging the variables
in the integrals we obtain:
Where
By using the R software we can simulate the hawkes process and the likelihood function in the next section.
So,
We assume the uniform random variable
and we obtain:
Consider the expression in the above equation
This can be written as
With
Hence one can solve the following equation:
And by using the following recursion we obtain:
Where
And
So, based on this recurrence equation we can simulate the Hawkes process with parameters
The originality of the Hawkes process application is explain in the rest of section. After originally being applied for earthquake prediction it has been also used to anticipate flash crashes in finance, epidemic type of behavior in social media such as Twitter and YouTube or criminality outbursts in big cities. So in this section we apply the Hawkes model to the terrorism events. Our empirical analysis relies on count data drawn from the Global Terrorism Database (GTD) for 1970–2015 [10]. We assume the background rate is stationary, and we compare that process to a stationary Poisson process through the AIC. The smoothed background rate model outperforms the other models with an AIC value of 801.1. By using the R software to apply Maximum Liklehood Estimator to estimate the parameters for the smoothed background rate model in equation (7), we obtain
which means that every event causes between 1 more event on average, and
is the average time over which we expect an attack event to happen following a background event, in our case we have
days which signifies we have about 17 days to arrive or prepare for another attacks. We have
is equal to the number of events in the interval
and
is an estimate for the number of background events in the data set which is about 83% of all the attacks terrorism in the MENA region. Based on Figure 6, we remark the trend form of the data, we remark that the stationary Poisson process is unlikely to give rise to our observed sequence of events. Rather use the AIC to evaluate the self-exciting model against a corresponding non-stationary Poisson model with self-excitation removed
We note that the “black’ line represents the initial data set and the “red” line represents the predictive series which we can say the evolution of the terrorism events in the future. By using the SEISMIC software and the dataset (GTD) and the R package we can predict the attack terrorism which that increases the probability that you’ll have another attack which estimate the probability of future attacks at different times and in different areas.![]() | Figure 4. Simulated trajectory of the Hawkes process |
![]() | Figure 5. Estimated intensity function |
![]() | Figure 6. Terrorism attacks between 1970 and 2015 |