DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics

Society’s growing dependence on computers and information technologies has been matched by an escalation of the frequency and sophistication of cyber attacks committed by criminals operating from the Darknet. As a result, security researchers have taken an interest in scrutinizing the Darknet and other underground web communities to develop a better understanding of cybercriminals and emerging threats. However, many scholars lack the capability or expertise to operationalize Darknet research and are thus unable to contribute to this increasingly impactful body of literature. This article introduces a framework for guiding such research, called Darknet Identification, Collection, Evaluation, with Ethics (DICE-E). The DICE-E framework provides a focused reference point and detailed guidelines for scholars wishing to become active in the Darknet research stream. Four steps to conducting Darknet forum research are outlined: (1) identification of Darknet data sources, (2) data collection strategies, (3) evaluation of Darknet data, and (4) ethical concerns related to Darknet research. To illustrate how DICE-E can be utilized, an example empirical study is reported. This exemplar illustrates how DICE-E can guide scholars through key decision points when attempting to incorporate the Darknet within their research.

[1]  Christopher Krügel,et al.  Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.

[2]  R. Hyman Quasi-Experimentation: Design and Analysis Issues for Field Settings (Book) , 1982 .

[3]  Nicolas Christin,et al.  Ethics in cryptomarket research. , 2016, The International journal on drug policy.

[4]  Hsinchun Chen,et al.  Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[5]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[6]  Hsinchun Chen,et al.  Developing understanding of hacker language through the use of lexical semantics , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[7]  Bin Zhang,et al.  Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..

[8]  Monica J. Barratt,et al.  Active engagement with stigmatised communities through digital ethnography , 2016 .

[9]  Hsinchun Chen,et al.  AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[10]  Dennis W. Leitner,et al.  A Comparison of Ordinary Least Squares and Logistic Regression , 2003 .

[11]  Victor A. Benjamin,et al.  Securing cyberspace: Identifying key actors in hacker communities , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[12]  Neal Leavitt,et al.  Anonymization Technology Takes a High Profile , 2009, Computer.

[13]  James Martin,et al.  Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’ , 2014 .

[14]  Christopher D. Manning,et al.  Advances in natural language processing , 2015, Science.

[15]  David Décary-Hétu,et al.  Criminals and signals: An assessment of criminal performance in the carding underworld , 2016 .

[16]  Chuan-Hoo Tan,et al.  Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..

[17]  D. Décary-Hêtu,et al.  Discrediting Vendors in Online Criminal Markets , 2016 .

[18]  Hsinchun Chen,et al.  Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[19]  Antoinette H Cotton Ensnaring Webs and Nets: Ethical issues in Internet-based research , 2003, Contemporary nurse.

[20]  Hsinchun Chen,et al.  AZDrugMiner: An Information Extraction System for Mining Patient-Reported Adverse Drug Events in Online Patient Forums , 2013, ICSH.

[21]  Nigel Shadbolt,et al.  Why forums?: an empirical analysis into the facilitating factors of carding forums , 2013, WebSci.

[22]  Bettina Hoser,et al.  Questions on ethics for research in the virtually connected world , 2010, Soc. Networks.

[23]  Joshua D. Freilich,et al.  Exploring the Subculture of Ideologically Motivated Cyber-Attackers , 2017 .

[24]  John R. Carlson,et al.  Channel Expansion Theory and the Experiential Nature of Media Richness Perceptions , 1999 .

[25]  Siva Viswanathan,et al.  Strategic Behavior in Online Reputation Systems: Evidence from Revoking on eBay , 2013, MIS Q..

[26]  Jaziar Radianti A Study of a Social Behavior inside the Online Black Markets , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[27]  Christian Platzer,et al.  Covertly Probing Underground Economy Marketplaces , 2010, DIMVA.

[28]  Detmar W. Straub,et al.  Moving toward black hat research in information systems security: an editorial introduction to the special issue , 2010 .

[29]  Veda C. Storey,et al.  Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..

[30]  Elizabeth Buchanan,et al.  Internet research ethics and the institutional review board: current practices and issues , 2009, CSOC.

[31]  Hsinchun Chen,et al.  Evaluating text visualization: An experiment in authorship analysis , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[32]  Richard Frank,et al.  Shuffle Up and Deal: Use of a Capture–Recapture Method to Estimate the Size of Stolen Data Markets , 2017 .

[33]  Stefan Savage,et al.  An analysis of underground forums , 2011, IMC '11.

[34]  Craig Webber,et al.  Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets , 2017 .

[35]  Bonnie Brinton Anderson,et al.  More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable , 2016, Inf. Syst. Res..

[36]  Richard Clayton,et al.  Configuring Zeus: A case study of online crime target selection and knowledge transmission , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).

[37]  Mike Thelwall,et al.  Web crawling ethics revisited: Cost, privacy, and denial of service , 2006, J. Assoc. Inf. Sci. Technol..