Under the Underground: Predicting Private Interactions in Underground Forums

05/11/2018
by   Rebekah Overdorf, et al.
0

Underground forums where users discuss, buy, and sell illicit services and goods facilitate a better understanding of the economy and organization of cybercriminals. Prior work has shown that in particular private interactions provide a wealth of information about the cybercriminal ecosystem. Yet, those messages are seldom available to analysts, except when there is a leak. To address this problem we propose a supervised machine learning based method able to predict which public will generate private messages, after a partial leak of such messages has occurred. To the best of our knowledge, we are the first to develop a solution to overcome the barrier posed by limited to no information on private activity for underground forum analysis. Additionally, we propose an automate method for labeling posts, significantly reducing the cost of our approach in the presence of real unlabeled data. This method can be tuned to focus on the likelihood of users receiving private messages, or triggering private interactions. We evaluate the performance of our methods using data from three real forum leaks. Our results show that public information can indeed be used to predict private activity, although prediction models do not transfer well between forums. We also find that neither the length of the leak period nor the time between the leak and the prediction have significant impact on our technique's performance, and that NLP features dominate the prediction power.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/27/2022

The Role of Reusable and Single-Use Side Information in Private Information Retrieval

This paper introduces the problem of Private Information Retrieval with ...
research
04/12/2020

PrivEdge: From Local to Distributed Private Training and Prediction

Machine Learning as a Service (MLaaS) operators provide model training a...
research
06/17/2019

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...
research
09/20/2018

PP-DBLP: Modeling and Generating Attributed Public-Private Networks with DBLP

In many online social networks (e.g., Facebook, Google+, Twitter, and In...
research
01/22/2020

Talek: Private Group Messaging with Hidden Access Patterns

Talek is a private group messaging system that sends messages through po...
research
03/05/2023

Prompt-Based Learning for Thread Structure Prediction in Cybersecurity Forums

With recent trends indicating cyber crimes increasing in both frequency ...
research
11/19/2019

Survival and Neural Models for Private Equity Exit Prediction

Within the Private Equity (PE) market, the event of a private company un...

Please sign up or login with your details

Forgot password? Click here to reset