International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019 1467 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: D7590118419/2019©BEIESP DOI:10.35940/ijrte.D7590.118419 Data Aggregation and Terror Group Prediction using Machine Learning Algorithms S P Maniraj, Deep Chaudhary, Vankayala Hari Deep, Vishesh Pratap Singh Abstract : This paper is about to introduce a proposed system that examines growth or decay of the terrorist groups by the time, active locations, types of attack they carry out, motive targets, Weapon mastery and availability and many parameters to analyze the patterns and hidden structures in their activity and to predict the occasion and type of their future attack. We have done a detailed analysis of data we get from different sources and we also performed different classification algorithms on the available data to find the chances of probable attack on different regions.Based on results finding which of the algorithms works with highest accuracy. Key Words: Analysis, Classification, prediction, terrorism, Data aggregation, Terror Group. I. INTRODUCTION Over the past many years the world has been a witness for the remarkable number of terrorist events because of the terrorist event, the main victim is people the terrorist event which is happening in the world is not in the random order each terrorist event is interlinked with other in the world. We used to follow a particular pattern that initiates the terrorist activity; our task is to predict the event before they initiate it. To obtain the real- time data of the past terrorist events in the world and implement the clustering and data aggregation with the algorithms like logistic regression, SVM, K-NN we analyze clusters related to four combinations terrorism - event terrorism target , terrorism target-terrorism agencies , terrorism agencies- terrorism attack type ,terrorism attack type-terrorism method, terrorism method-victim location. Through dataset, intuition is to annually analyzing the number of content of the cluster, effectively from 1980 to till date. Based on the clustering and data classification mechanism work is to predict the terrorist group responsible based time duration, event place, agencies, target, and attack type from the input and predicting terrorist group as output.According to the Global Terrorism Data report there is certain criterion to be chalked out to decide the objective and find the solution. II. RELATED WORKS 1.The paper published by Dr.Tariq Mahmood and Mr.Khadija Rohail has suggested worked on applying the use of data minining methods on terror activities in Pakistan. The study was focused on the cluster analysis which is used to group all raw data together in form of clusters as they possess common property, so it was found out to be ClOPE Revised Manuscript Received on November 15, 2019 S P Maniraj, Assistant Professor (Senior Grade), Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India. Deep Chaudhary, Student B.Tech, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India. Vankayala Hari Deep, Student B.Tech, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India. Vishesh Pratap Singh, Student B.Tech, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India. as a proficient algorithm to analyze clusters on the raw data to analyze the terror groups or active organizations of any area as their study was specifically based on 4 provinces of Pakistan it provides the clustered data in form of target-type, target party, locations and several other factors that distinguishes them. 2. The paper on Effectiveness of Terrorism policies by Chaomin Lou and yang li suggests that their work is used to make the assumptions based on theory evaluation and then it test the effectiveness of US counter terrorism policies by implementing a time series interrupted model. This model is used to improve as it categorizes the policies based on their proactiveness it simplifies a time series equation that give results on basis of some mannequin parameters that are used to rate the policies in three categories as proactive, policy that works on the root of terrorism and also insignificant policies it worked well as time series functionality improves with the increase in the number of training data it was a commendable works as it helps to determine active policies and their model was tested on insurance policies too which gave them some excellent results. 3. Most related work was to form a predictive modeling model that gives warnings about the future assaults on Pakistan by two scholars Hina Muhammad Ismail and Abdullah Kazi their journal suggests the use of classification modeling. The study was to analyze the previous incident records which were available in GTD database. This study was focused specifically to Pakistan it takes certain common parameters which helps in identifying the threats to type of targets and locations that helps security agencies to work and make decision based on collective feed by the previous records to aid them for keeping security measures. III. PROCESSING A.ARCHITECTURE MODEL Based upon the proposed system it is essential to depict the significance of each step for elaborating the method or techniques used for drawing out inference based on the given dataset Model is, collecting data is used to capture records of past events to analyze data and find the recurring patterns to draw out inference that which data is useful and which data is of no use. Data is collected from GTD (Global Terrorism Database). B.DATA COLLECTION In this phase it is necessary that the data we collect is gathered from relevant sources. The quantity and quality of data tells how accurate the On terrorism which is gathered from relevant sources. Architecture model represents the