Extracting Social Structure from DarkWeb Forums

This paper explores various Social Network Analysis (SNA) techniques in order to identify a range of potentially ‘important’ members of Islamic Networks within Dark Web Forums. For this experiment, we conducted our investigation on five forums collected in previous work as part of the DarkWeb Forum portal and built upon the tool support created in our previous research in order to visualise and analyse the network. Whilst existing work attempts to identify these structures through state-of-the-art Computational Linguistic techniques, our work relies on the communication metadata alone. Our analysis involved first calculating a range of SNA metrics to better understand the group members, and then apply unsupervised learning in order to create clusters that would help classify the Dark Web Forums users into hierarchical clusters. In order to create our social networks, we investigated the effect of repeated author resolution and various weighting schemes on the ranking of forum members by creating four social networks per forum and evaluating the correlation of the top n users (for n = 10; 20; 30; 40; 50 and 100). Our results identified that varying the weighting schemes created more consistent ranking schemes than varying the repeated author resolution.

[1]  Claus Atzenbeck,et al.  Proceedings of the 2009 IEEE international conference on Intelligence and security informatics , 2009 .

[2]  Wenji Mao,et al.  Intelligence and Security Informatics: Research Frameworks , 2013, Intelligence and Security Informatics.

[3]  Darren J Wilkinson,et al.  Bayesian parameter inference for stochastic biochemical network models using particle Markov chain Monte Carlo , 2011, Interface Focus.

[4]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[5]  A. Vázquez,et al.  Network clustering coefficient without degree-correlation biases. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Christopher C. Yang,et al.  Analyzing the Terrorist Social Networks with Visualization Tools , 2006, ISI.

[7]  Sadie Creese,et al.  Applying Social Network Analysis to Security , 2015 .

[8]  Sebastián A. Ríos,et al.  Topic-based social network analysis for virtual communities of interests in the Dark Web , 2010, ISI-KDD '10.

[9]  Kathy Crilley Information warfare: new battle fields Terrorists, propaganda and the Internet , 2001 .

[10]  Hsinchun Chen,et al.  Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[11]  Phyllis B. Gerstenfeld,et al.  Hate Online: A Content Analysis of Extremist Internet Sites , 2003 .

[12]  Coenraad Bron,et al.  Finding all cliques of an undirected graph , 1973 .

[13]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[14]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[15]  S. B. Lyerly The average spearman rank correlation coefficient , 1952 .

[16]  Philip Sedgwick,et al.  Pearson’s correlation coefficient , 2012, BMJ : British Medical Journal.

[17]  Stefan Richter,et al.  Centrality Indices , 2004, Network Analysis.

[18]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[19]  Hsinchun Chen,et al.  US domestic extremist groups on the Web: link and content analysis , 2005, IEEE Intelligent Systems.

[20]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[21]  Grace S. Shieh A weighted Kendall's tau statistic , 1998 .

[22]  C. Bron,et al.  Algorithm 457: finding all cliques of an undirected graph , 1973 .

[23]  T. Stevens Regulating the ‘Dark Web’: How a Two-Fold Approach can Tackle Peer-to-Peer Radicalisation , 2009 .

[24]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[25]  Valdis E. Krebs,et al.  Uncloaking Terrorist Networks , 2002, First Monday.

[26]  Valdis E. Krebs,et al.  Mapping Networks of Terrorist Cells , 2001 .

[27]  Lise Getoor,et al.  Link mining: a survey , 2005, SKDD.

[28]  Hsinchun Chen Dark Web Forum Portal , 2012 .