2018 IEEE International Conference on Big Knowledge (ICBK) 2018
DOI: 10.1109/icbk.2018.00028
|View full text |Cite
|
Sign up to set email alerts
|

KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Pete et al 26 utilized network centrality analysis to highlight the structural patterns of each network to identify important nodes and key hackers. Zhang et al 10 proposed a new heterogeneous information network (HIN) embedding model named ActorHin2Vec to learn the low-dimensional representations for the nodes in HIN, and then a classifier was built for key actor identification. Grisham et al 11 used a state-of-the-art neural network architecture model to identify mobile malware attachments and then social network-based analysis techniques to determine key hackers disseminating mobile malware.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Pete et al 26 utilized network centrality analysis to highlight the structural patterns of each network to identify important nodes and key hackers. Zhang et al 10 proposed a new heterogeneous information network (HIN) embedding model named ActorHin2Vec to learn the low-dimensional representations for the nodes in HIN, and then a classifier was built for key actor identification. Grisham et al 11 used a state-of-the-art neural network architecture model to identify mobile malware attachments and then social network-based analysis techniques to determine key hackers disseminating mobile malware.…”
Section: Related Workmentioning
confidence: 99%
“…In existing research, two main methods have been used to identify key hackers in underground forums: content-based analysis 79 and social network-based analysis. 1012 Content-based approaches analyze user data based on selected evaluation metrics, such as activity and content quality. Social network-based approaches build a social network on an underground forum in which key hackers have a high degree of network centrality, with common approaches including degree centrality, eigenvector centrality, and PageRank.…”
Section: Introductionmentioning
confidence: 99%
“…This can support intervention and prevention campaigns [49]. Unsurprisingly, there is considerable interest [49], [27], [76], [77], [25], [31] in key actors and this is a core theme of underground forum analysis. 2) Analysing underground economies: Underground forums are not only a platform to exchange ideas and information, but also serve as marketplaces for trading.…”
Section: A Areas Of Focusmentioning
confidence: 98%
“…Datasets have been obtained by researchers in a number of ways. Some collect data themselves [75], [77], [25], for example by scraping underground forums. Others request data from other sources, or work with publicly available datasets, such as databases that have been breached and publicly leaked.…”
Section: B Data Sources and Volumementioning
confidence: 99%
“…SNA is extensively used to identify key actors in underground forums [17], [31], [32]. Our centrality metric approach is similar to Pete et al [33], who constructed undirected graphs of six underground forums based on 6 months of observation, computed network statistics, and analyzed the network structure.…”
Section: B Social Network Analysis Of Underground Forumsmentioning
confidence: 99%