Companion Proceedings of the 2019 World Wide Web Conference 2019
DOI: 10.1145/3308560.3314197
|View full text |Cite
|
Sign up to set email alerts
|

Extracting actionable information from Security Forums

Abstract: The goal of this work is to systematically extract information from hacker forums, whose information would be in general described as unstructured: the text of a post is not necessarily following any writing rules. By contrast, many security initiatives and commercial entities are harnessing the readily public information, but they seem to focus on structured sources of information. Here, we focus on the problem of analyzing text content in security forums. A key novelty is that we use user profiles and contex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…There is a wealth of information that can be extracted from security forums, which motivates this research direction. Earlier work suggests that there is close to four times more malicious IP addresses in forums compared to established databases of such IP addresses [8]. At the same time, there are tens of thousands of IP addresses in the forums, as we will see later.…”
Section: Introductionmentioning
confidence: 63%
See 3 more Smart Citations
“…There is a wealth of information that can be extracted from security forums, which motivates this research direction. Earlier work suggests that there is close to four times more malicious IP addresses in forums compared to established databases of such IP addresses [8]. At the same time, there are tens of thousands of IP addresses in the forums, as we will see later.…”
Section: Introductionmentioning
confidence: 63%
“…These features capture the behaviour of the author, including frequency of posting, average post length etc. These features were introduced by earlier work [8], with the rationale that profiling the author of a post can help us infer their intention and role and thus, improve the classification.…”
Section: The Ip Characterization Modulementioning
confidence: 99%
See 2 more Smart Citations
“…Sundaresan et al extracted Skype handles from public posts and translated those to their actual IP address to characterize the location of users in underground forums [12]. Gharibshah et al presented a cross-correlation between the IP addresses that users post and the database from VirusTotal to understand and characterize malicious users [36]. Egele et al modeled message characteristics on Social Networks to detect compromised (hacked) accounts [37].…”
Section: Background and Related Workmentioning
confidence: 99%