Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Link Prediction-Based Multi-Identity Recognition of Darknet Vendors

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14252))

Included in the following conference series:

  • 977 Accesses

Abstract

The darknet has been a notorious hub for illegal and criminal activities. One of the major challenges in identifying criminals involved in darknet market transactions is the presence of multi-identity vendors, who operate under different accounts to evade detection. Existing methods have limitations such as incomplete feature characterization, imprecise data annotation, and an inability to analyze across markets. In this paper, we propose a new approach to address these issues. Rich information of traded goods is collected from 21 currently existing English darknet markets as experimental data. Our method entails extracting text and image features and computing the writing style of suppliers. Subsequently, the feature dimension is reduced and pseudo labeling is applied to improve label accuracy. Further, four types of data about vendors are mapped onto a heterogeneous information network to characterize potential relationships among darknet vendors. By leveraging the graph neural network algorithm and Siamese neural networks, the link relationship between different accounts is predicted to determine whether they belong to the same supplier. The experimental results demonstrate the effectiveness of our proposed method in identifying different accounts belonging to the same supplier with a maximum accuracy of 99.75% and a recall rate of 99.09%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: a distributed anonymous information storage and retrieval system. In: Workshop on Design Issues in Anonymity and Unobservability (2000)

    Google Scholar 

  2. Me, G., Pesticcio, L., Spagnoletti, P.: Discovering hidden relations between tor marketplaces users. In: 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 15th International Conference on Pervasive Intelligence and Computing, 3rd International Confernce on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), pp. 494–501 (2017)

    Google Scholar 

  3. Kumar, R., et al.: edarkfind: unsupervised multi-view learning for sybil account detection. In: Proceedings of The Web Conference 2020 (2020)

    Google Scholar 

  4. Wang, X., Peng, P., Wang, C., Wang, G.: You are your photographs: detecting multiple identities of vendors in the darknet marketplaces. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security (2018)

    Google Scholar 

  5. Zhang, Y., et al.: Your style your identity: leveraging writing and photography styles for drug trafficker identification in darknet markets over attributed heterogeneous information network. In: The World Wide Web Conference (2019)

    Google Scholar 

  6. Mosteller, F., Wallace, D.L.: A comparative study of discrimination methods applied to the authorship of the disputed federalist papers (2016)

    Google Scholar 

  7. Jeziorowski, S.: Dark vendor profilng (2020)

    Google Scholar 

  8. Ekambaranathan, A.: Using stylometry to track cybercriminals in darknet forums (2018)

    Google Scholar 

  9. Zhang, Y., et al.: dstyle-gan: generative adversarial network based on writing and photography styles for drug identification in darknet markets. In: Annual Computer Security Applications Conference (2020)

    Google Scholar 

  10. Netsec-SJTU: darkweb-market-dataset-2021. Website (2022). https://github.com/Netsec-SJTU/darkweb-market-dataset-2021

  11. Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. ArXiv abs/1810.04805 (2019)

    Google Scholar 

  12. Vaswani, A., et al.: Attention is all you need. ArXiv abs/1706.03762 (2017)

    Google Scholar 

  13. Le, Q.V., Mikolov, T.: Distributed representations of sentences and documents. In: ICML (2014)

    Google Scholar 

  14. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778 (2016)

    Google Scholar 

  15. Shlens, J.: A tutorial on principal component analysis. ArXiv abs/1404.1100 (2014)

    Google Scholar 

  16. Benton, A., Arora, R., Dredze, M.: Learning multiview embeddings of twitter users. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (vol. 2: Short Papers) (2016)

    Google Scholar 

  17. Lee, D.H.: Pseudo-label : the simple and efficient semi-supervised learning method for deep neural networks (2013)

    Google Scholar 

  18. Yang, Y., Lichtenwalter, R., Chawla, N.: Evaluating link prediction methods. Knowl. Inf. Syst. 45, 751–782 (2014)

    Article  Google Scholar 

  19. Jaccard, P.: The distribution of the flora in the alpine zone.1. New Phytol. 11, 37–50 (1912)

    Google Scholar 

  20. Hamilton, W.L., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: NIPS (2017)

    Google Scholar 

  21. Chopra, S., Hadsell, R., LeCun, Y.: Learning a similarity metric discriminatively, with application to face verification. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), vol. 1, pp. 539–546 (2005)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the National Key Research and Development Program of China (No.2020YFB1807500)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Futai Zou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zou, F., Hu, Y., Xu, W., Wu, Y. (2023). Link Prediction-Based Multi-Identity Recognition of Darknet Vendors. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds) Information and Communications Security. ICICS 2023. Lecture Notes in Computer Science, vol 14252. Springer, Singapore. https://doi.org/10.1007/978-981-99-7356-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7356-9_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7355-2

  • Online ISBN: 978-981-99-7356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics