Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3308558.3313537acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network

Published: 13 May 2019 Publication History

Abstract

Due to its anonymity, there has been a dramatic growth of underground drug markets hosted in the darknet (e.g., Dream Market and Valhalla). To combat drug trafficking (a.k.a. illicit drug trading) in the cyberspace, there is an urgent need for automatic analysis of participants in darknet markets. However, one of the key challenges is that drug traffickers (i.e., vendors) may maintain multiple accounts across different markets or within the same market. To address this issue, in this paper, we propose and develop an intelligent system named uStyle-uID leveraging both writing and photography styles for drug trafficker identification at the first attempt. At the core of uStyle-uID is an attributed heterogeneous information network (AHIN) which elegantly integrates both writing and photography styles along with the text and photo contents, as well as other supporting attributes (i.e., trafficker and drug information) and various kinds of relations. Built on the constructed AHIN, to efficiently measure the relatedness over nodes (i.e., traffickers) in the constructed AHIN, we propose a new network embedding model Vendor2Vec to learn the low-dimensional representations for the nodes in AHIN, which leverages complementary attribute information attached in the nodes to guide the meta-path based random walk for path instances sampling. After that, we devise a learning model named vIdentifier to classify if a given pair of traffickers are the same individual. Comprehensive experiments on the data collections from four different darknet markets are conducted to validate the effectiveness of uStyle-uID which integrates our proposed method in drug trafficker identification by comparisons with alternative approaches.

References

[1]
Sami Abu-El-Haija, Bryan Perozzi, and Rami Al-Rfou. 2017. Learning edge representations via low-rank asymmetric projections. In CIKM. ACM, 1787-1796.
[2]
Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, and Damon McCoy. 2014. Doppelgänger finder: Taking stylometry to the underground. In Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 212-226.
[3]
Julian Brose´us, Damien Rhumorbarbe, Caroline Mireault, Vincent Ouellette, Frank Crispino, and David De´cary-He´tu. 2016. Studying illicit drug trafficking on Darknet markets: structure and organisation from a Canadian perspective. Forensic science international264 (2016), 7-14.
[4]
Julia Buxton and Tim Bingham. 2015. The rise and challenge of dark net drug markets. Policy Brief7(2015).
[5]
Prima Chairunnanda, Nam Pham, and Urs Hengartner. 2011. Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns. In SocialCom/PASSAT. 974-980.
[6]
Richard Colbaugh and Kristin Glass. 2011. Proactive defense for evolving cyber threats. In ISI. IEEE, 125-130.
[7]
Ritendra Datta, Dhiraj Joshi, Jia Li, and James Z Wang. 2006. Studying aesthetics in photographic images using a computational approach. In ECCV. Springer, 288-301.
[8]
Hakan Demirbuken and others. 2011. The Global Afghan Opium Trade: A Threat Assessment. UNODC Report (2011), 3-4.
[9]
Martin Dittus, Joss Wright, and Mark Graham. 2018. Platform Criminalism: The'last-mile'geography of the darknet market supply chain. In WWW. International World Wide Web Conferences Steering Committee, 277-286.
[10]
Yuxiao Dong, Nitesh V Chawla, and Ananthram Swami. 2017. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD. ACM, 135-144.
[11]
Yujie Fan, Shifu Hou, Yiming Zhang, Yanfang Ye, and Melih Abdulhayoglu. 2018. Gotcha-sly malware!: Scorpion a metagraph2vec based malware detection system. In KDD. ACM, 253-262.
[12]
Yujie Fan, Yiming Zhang, Yanfang Ye, and Xin Li. 2018. Automatic Opioid User Detection from Twitter: Transductive Ensemble Built on Different Meta-graph Based Similarities over Heterogeneous Information Network. In IJCAI. 3357-3363.
[13]
Yujie Fan, Yiming Zhang, Yanfang Ye, Wanhong Zheng, and others. 2017. Social media for opioid addiction epidemiology: Automatic detection of opioid addicts from twitter and case studies. In CIKM. ACM, 1259-1267.
[14]
Tao-yang Fu, Wang-Chien Lee, and Zhen Lei. 2017. HIN2Vec: Explore Meta-paths in Heterogeneous Information Networks for Representation Learning. In CIKM. ACM, 1797-1806.
[15]
Dario Garcia-Gasulla, Eduard Ayguade´, Jesús Labarta, Javier Be´jar, Ulises Corte´s, Toyotaro Suzumura, and R Chen. 2017. A visual embedding for the unsupervised extraction of abstract semantics. Cognitive Systems Research42 (2017), 73-81.
[16]
Michael Gilbert and Nabarun Dasgupta. 2017. Silicon to syringe: Cryptomarkets and disruptive innovation in opioid supply chains. International Journal of Drug Policy46 (2017), 160-167.
[17]
P. Griffiths and J. Mounteney. 2017. Disruptive potential of the internet to transform illicit drug markets and impact on future patterns of drug consumption. Clinical Pharmacology & Therapeutics101, 2 (2017).
[18]
Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In KDD. ACM, 855-864.
[19]
Geoffrey Hinton, Li Deng, Dong Yu, George E Dahl, Abdel-rahman Mohamed, Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N Sainath, and others. 2012. Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal processing magazine29, 6 (2012), 82-97.
[20]
Thanh Nghia Ho and Wee Keong Ng. 2016. Application of stylometry to darkweb forum user identification. In ICS. Springer, 173-183.
[21]
Shifu Hou, Yanfang Ye, Yangqiu Song, and Melih Abdulhayoglu. 2017. Hindroid: An intelligent android malware detection system based on structured heterogeneous information network. In KDD. ACM, 1507-1515.
[22]
Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167(2015).
[23]
Dev Kar and Joseph Spanjers. 2017. Transnational crime and the developing world. (2017).
[24]
Yan Ke, Xiaoou Tang, and Feng Jing. 2006. The design of high-level features for photo quality assessment. In CVPR, Vol. 1. IEEE, 419-426.
[25]
Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In ICML. 1188-1196.
[26]
Xiang Li, Yao Wu, Martin Ester, Ben Kao, Xin Wang, and Yudian Zheng. 2017. Semi-supervised clustering in attributed heterogeneous information networks. In WWW. 1621-1629.
[27]
Dream Market. 2018. Dream Market. http://6khhxwj7viwe5xjm.onion.
[28]
James Martin. 2014. Drugs on the dark net: How cryptomarkets are transforming the global trade in illicit drugs. (2014).
[29]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781(2013).
[30]
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119.
[31]
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In KDD. ACM, 701-710.
[32]
Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, and Pierre Esseiva. 2016. Buying drugs on a Darknet market: A better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic science international267 (2016), 173-182.
[33]
SilkRoad. 2018. SilkRoad. http://silkroad7rn2puhj.onion.
[34]
Martijn Spitters, Femke Klaver, Gijs Koot, and Mark van Staalduinen. 2015. Authorship analysis on dark marketplace forums. In EISIC.
[35]
Yizhou Sun, Jiawei Han, Xifeng Yan, Philip S Yu, and Tianyi Wu. 2011. Pathsim: Meta path-based top-k similarity search in heterogeneous information networks. VLDB Endowment4, 11 (2011), 992-1003.
[36]
Fiona J Tweedie and R Harald Baayen. 1998. How variable may a constant be? Measures of lexical richness in perspective. Computers and the Humanities32, 5 (1998), 323-352.
[37]
Valhalla. 2018. Valhalla. http://valhallaxmn3fydu.onion.
[38]
Joe Van Buskirk, Amanda Roxburgh, Michael Farrell, and Lucy Burns. 2014. The closure of the Silk Road: What has this meant for online drug trading?Addiction109, 4 (2014).
[39]
Joe Van Buskirk, Amanda Roxburgh, Sundresan Naicker, and Lucinda Burns. 2015. A response to Dolliver's “Evaluating drug trafficking on the Tor network”. International Journal of Drug Policy26, 11 (2015).
[40]
Xiangwen Wang, Peng Peng, Chun Wang, and Gang Wang. 2018. You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces. In ACCCS. ACM, 431-442.
[41]
Xiang Zhang, Junbo Zhao, and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649-657.
[42]
Yiming Zhang, Yujie Fan, Shifu Hou, Jian Liu, Yanfang Ye, and Thirimachos Bourlai. 2018. iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network. In ASONAM. IEEE, 1071-1078.
[43]
Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, Jiabin Wang, Qi Xiong, and Fudong Shao. 2018. KADetector: Automatic Identification of Key Actors in Online Hack Forums Based on Structured Heterogeneous Information Network. In ICBK. IEEE, 154-161.

Cited By

View all
  • (2024)A New Scheme for Abnormal Data Transmission Behavior Detection with Network-Wide Perspective2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR)10.1109/ISSSR61934.2024.00021(122-133)Online publication date: 16-Mar-2024
  • (2024)Self-Training GNN-based Community Search in Large Attributed Heterogeneous Information Networks2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00216(2765-2778)Online publication date: 13-May-2024
  • (2024)HEAMWalk: Heterogeneous Network Embedding Based on Attribute Combined Multi-view Random WalksAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5618-6_17(199-211)Online publication date: 1-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
WWW '19: The World Wide Web Conference
May 2019
3620 pages
ISBN:9781450366748
DOI:10.1145/3308558
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • IW3C2: International World Wide Web Conference Committee

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attributed Heterogeneous Information Network (AHIN)
  2. Darknet Market
  3. Drug Trafficker Identification
  4. Network Embedding.

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WWW '19
WWW '19: The Web Conference
May 13 - 17, 2019
CA, San Francisco, USA

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)54
  • Downloads (Last 6 weeks)3
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A New Scheme for Abnormal Data Transmission Behavior Detection with Network-Wide Perspective2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR)10.1109/ISSSR61934.2024.00021(122-133)Online publication date: 16-Mar-2024
  • (2024)Self-Training GNN-based Community Search in Large Attributed Heterogeneous Information Networks2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00216(2765-2778)Online publication date: 13-May-2024
  • (2024)HEAMWalk: Heterogeneous Network Embedding Based on Attribute Combined Multi-view Random WalksAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5618-6_17(199-211)Online publication date: 1-Aug-2024
  • (2023)“It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in OrganisationsProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617116(344-355)Online publication date: 16-Oct-2023
  • (2023)Graph Mining for Cybersecurity: A SurveyACM Transactions on Knowledge Discovery from Data10.1145/361022818:2(1-52)Online publication date: 13-Nov-2023
  • (2023)A Survey on Heterogeneous Graph Embedding: Methods, Techniques, Applications and SourcesIEEE Transactions on Big Data10.1109/TBDATA.2022.31774559:2(415-436)Online publication date: 1-Apr-2023
  • (2023)Hypergraph Contrastive Learning for Drug Trafficking Community Detection2023 IEEE International Conference on Data Mining (ICDM)10.1109/ICDM58522.2023.00149(1205-1210)Online publication date: 1-Dec-2023
  • (2023)Towards a Conceptual Typology of Darknet RisksJournal of Computer Information Systems10.1080/08874417.2023.223432364:4(565-576)Online publication date: 14-Jul-2023
  • (2023)Link Prediction-Based Multi-Identity Recognition of Darknet VendorsInformation and Communications Security10.1007/978-981-99-7356-9_19(317-332)Online publication date: 20-Oct-2023
  • (2022)VeriDarkProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3601403(15574-15588)Online publication date: 28-Nov-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media