Understanding and Predicting Private Interactions in Underground Forums

作者: Zhibo Sun , Carlos E. Rubio-Medrano , Ziming Zhao , Tiffany Bao , Adam Doupé

DOI: 10.1145/3292006.3300036

关键词: Computer scienceData scienceRobustness (economics)Adversarial systemWorkflowCybercrime

摘要: The studies on underground forums and marketplaces have significantly advanced our understandings of cybercrime workflows economies. Researchers economies conducted comprehensive public interactions. However, little research focuses private lack the investigation interactions may cause misunderstandings economies, as users in tend to share minimal amount information resort messages for follow-up conversations. In this paper, we propose methods investigate analyze a recently leaked dataset from Nulled.io. We present analyses contents purposes messages. addition, design machine learning-based models that only use publicly available detect if two privately communicate with each other. Finally, perform adversarial analysis evaluate robustness detector different types attacks.

参考文章(47)
Bing Liu, Lei Zhang, A Survey of Opinion Mining and Sentiment Analysis Mining Text Data. pp. 415- 463 ,(2012) , 10.1007/978-1-4614-3223-4_13
Yinzhi Cao, Junfeng Yang, Towards Making Systems Forget with Machine Unlearning 2015 IEEE Symposium on Security and Privacy. pp. 463- 480 ,(2015) , 10.1109/SP.2015.35
Andrés Corrada-Emmanuel, Andrew McCallum, Xuerui Wang, Topic and role discovery in social networks international joint conference on artificial intelligence. pp. 786- 791 ,(2005)
Ryan N. Lichtenwalter, Nitesh V. Chawla, Adaptive methods for classification in arbitrarily imbalanced and drifting data streams knowledge discovery and data mining. ,vol. 5669, pp. 53- 75 ,(2009) , 10.1007/978-3-642-14640-4_5
Thorsten Holz, Markus Engelberth, Felix Freiling, Learning more about the underground economy: a case-study of keyloggers and dropzones european symposium on research in computer security. pp. 1- 18 ,(2009) , 10.1007/978-3-642-04444-1_1
Nitesh V. Chawla, Data Mining for Imbalanced Datasets: An Overview The Data Mining and Knowledge Discovery Handbook. pp. 875- 886 ,(2005) , 10.1007/978-0-387-09823-4_45
Vern Paxson, Chris Grier, Damon McCoy, Alek Kolcz, Kurt Thomas, Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse usenix security symposium. pp. 195- 210 ,(2013)
Salvatore Scellato, Anastasios Noulas, Cecilia Mascolo, Exploiting place features in link prediction on location-based social networks Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '11. pp. 1046- 1054 ,(2011) , 10.1145/2020408.2020575
Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna, Drops for Stuff: An Analysis of Reshipping Mule Scams computer and communications security. pp. 1081- 1092 ,(2015) , 10.1145/2810103.2813620
Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt, Honor among thieves: A common's analysis of cybercrime economies 2013 APWG eCrime Researchers Summit. pp. 1- 11 ,(2013) , 10.1109/ECRS.2013.6805778