LSTM and BERT based transformers models for cyber threat intelligence for intent identification of social media platforms exploitation from darknet forums

Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey
{"title":"LSTM and BERT based transformers models for cyber threat intelligence for intent identification of social media platforms exploitation from darknet forums","authors":"Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey","doi":"10.1007/s41870-024-02077-5","DOIUrl":null,"url":null,"abstract":"<p>Cybercriminals, terrorists, political activists, whistleblowers, and others are drawn to the darknet market and its use for illicit purposes. Various methods are employed to identify the people who are behind these identities and websites. Since DNMs are more recent than other platforms, there are more unexplored research possibilities in this field. Research has been done to identify the buying and selling of products connected to hacking from Darknet Marketplaces, the promotion of cyber threats in hacker’s forums and DNMs, and the supply chain elements of content related to cyber threats. The proposed research covers one of the most promising research areas: darknet markets and social media platforms exploitation tools and strategies. The research uses 6 DNMs publicly available data and then identified the most popular social media platform and intent of discussion based on the interaction available in form of the user remarks and comments. The research caters the social media platform and cybercrimes or threats associated to them, by help of the machine learning algorithms Logistic Regression, RandomForestClassifier, GradientBoostingClassifier, KNeighborsClassifier, XGBClassifier, Voting Classifier and Deep Learning based model LSTM and Transformer based Model used. In existing research, natural language processing techniques were employed to identify the kinds of commodities exchanged in these markets, while machine learning approaches were utilized to classify product descriptions.In proposed research work advanced and lighter version of BERT and LSTM model used yielding accuracy of 90.12% and 91.35% respectively. LSTM performed best to extract multiclass classification of actual intension of social media usage by intelligent analysis on hackers’ discussions. Strategies on social media platforms such as Facebook, twitter, Instagram, Snapchat to exploit them using darknet platforms also explored. This paper contributes on cyber threat intelligence that leverages social media applications to work proactively to save their assets based on the threats identified in the Darknet.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"25 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s41870-024-02077-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cybercriminals, terrorists, political activists, whistleblowers, and others are drawn to the darknet market and its use for illicit purposes. Various methods are employed to identify the people who are behind these identities and websites. Since DNMs are more recent than other platforms, there are more unexplored research possibilities in this field. Research has been done to identify the buying and selling of products connected to hacking from Darknet Marketplaces, the promotion of cyber threats in hacker’s forums and DNMs, and the supply chain elements of content related to cyber threats. The proposed research covers one of the most promising research areas: darknet markets and social media platforms exploitation tools and strategies. The research uses 6 DNMs publicly available data and then identified the most popular social media platform and intent of discussion based on the interaction available in form of the user remarks and comments. The research caters the social media platform and cybercrimes or threats associated to them, by help of the machine learning algorithms Logistic Regression, RandomForestClassifier, GradientBoostingClassifier, KNeighborsClassifier, XGBClassifier, Voting Classifier and Deep Learning based model LSTM and Transformer based Model used. In existing research, natural language processing techniques were employed to identify the kinds of commodities exchanged in these markets, while machine learning approaches were utilized to classify product descriptions.In proposed research work advanced and lighter version of BERT and LSTM model used yielding accuracy of 90.12% and 91.35% respectively. LSTM performed best to extract multiclass classification of actual intension of social media usage by intelligent analysis on hackers’ discussions. Strategies on social media platforms such as Facebook, twitter, Instagram, Snapchat to exploit them using darknet platforms also explored. This paper contributes on cyber threat intelligence that leverages social media applications to work proactively to save their assets based on the threats identified in the Darknet.

Abstract Image

基于 LSTM 和 BERT 变换器模型的网络威胁情报,用于识别从暗网论坛利用社交媒体平台的意图
网络犯罪分子、恐怖分子、政治活动家、举报人和其他人都被吸引到暗网市场,并将其用于非法目的。人们采用各种方法来识别这些身份和网站背后的人。由于 DNM 比其他平台更新颖,因此该领域还有更多未开发的研究可能性。已经开展了一些研究,以确定从暗网市场买卖与黑客有关的产品、在黑客论坛和 DNM 上宣传网络威胁,以及与网络威胁有关的内容的供应链要素。拟议的研究涉及最有前途的研究领域之一:暗网市场和社交媒体平台的利用工具和策略。研究使用了 6 个 DNM 的公开数据,然后根据用户言论和评论的互动形式,确定了最受欢迎的社交媒体平台和讨论意图。在机器学习算法 Logistic Regression、RandomForestClassifier、GradientBoostingClassifier、KNeighborsClassifier、XGBClassifier、Voting Classifier 以及基于深度学习的 LSTM 模型和 Transformer 模型的帮助下,该研究对社交媒体平台和与之相关的网络犯罪或威胁进行了分析。在现有研究中,自然语言处理技术被用来识别这些市场中交易的商品种类,而机器学习方法则被用来对产品描述进行分类。在拟议的研究工作中,使用了高级和轻量级版本的 BERT 和 LSTM 模型,准确率分别为 90.12% 和 91.35%。通过对黑客讨论的智能分析,LSTM 在提取社交媒体实际使用意图的多类分类方面表现最佳。此外,还探讨了 Facebook、twitter、Instagram、Snapchat 等社交媒体平台利用暗网平台的策略。本文有助于利用社交媒体应用程序的网络威胁情报,根据在暗网中发现的威胁,积极主动地挽救资产。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信