skip to main content
10.1145/3625007.3627495acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article
Open access

RURLMAN: Matching Forum Users Across Platforms Using Their Posted URLs

Published: 15 March 2024 Publication History

Abstract

How can we leverage the URLs posted on online forums to connect forum users with their profiles on other platforms? Most previous studies primarily focus on analyzing textual content and user metadata, paying limited attention to URLs. In this paper, we propose RURLMAN, a modular ensemble of methods for leveraging user-posted URLs to connect online forum users with their cross-platform profiles. Our approach has two key features: (a) we focus on user-posted URLs as the key source of information, and (b) we utilize a modular stacked ensemble integrating multiple methods, including string-matching and two ChatGPT capabilities. We show that RURLMAN effectively combines the strengths of its component methods, outperforming each individual method with an F1 score of 92.6%. We apply RURLMAN in a case study comprising 1.3M URLs posted by 250K forum users across six online security forums and consider URLs to Twitter, Facebook, GitHub, and YouTube. First, we match 30% of the users who shared URLs to these platforms with the corresponding owners of the linked social media profiles. Second, we connect 8% of these users to profiles on multiple platforms. Finally, we identify and analyze "groups" of users based on their posted URLs. To facilitate further research, we will share access to RURLMAN and its datasets with the research community.

References

[1]
Best and most popular forums message boards online communities. [Online]. Available: https://it-maniacs.com/best-and-most-popular-forums-message-boards-and-online-communities-top-30/
[2]
Forum software usage distribution on the entire internet. [Online]. Available: https://trends.builtwith.com/cms/forum-software/traffic/Entire-Internet
[3]
S. Samtani and H. Chen, "Using social network analysis to identify key hackers for keylogging tools in hacker forums," in 2016 IEEE conference on intelligence and security informatics (ISI). IEEE, 2016, pp. 319--321.
[4]
B. Treves, M. R. Masud, and M. Faloutsos, "Urlytics: Profiling forum users from their posted urls," in 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2022, pp. 510--513.
[5]
S. Vosoughi, H. Zhou, and D. Roy, "Digital stylometry: Linking profiles across social networks," in Social Informatics: 7th International Conference, SocInfo, Beijing, China. Springer, 2015.
[6]
T. N. Ho and W. K. Ng, "Application of stylometry to darkweb forum user identification," in 2016 ICICS, K.-Y. Lam, C.-H. Chi, and S. Qing, Eds. Springer International Publishing, 2016.
[7]
D. Chatzakou, J. Soler-Company, T. Tsikrika, L. Wanner, S. Vrochidis, and I. Kompatsiaris, "User identity linkage in social media using linguistic and social interaction features," in Proceedings of the 12th ACM Conference on Web Science, 2020.
[8]
L. A. T. Nguyen, B. L. To, H. K. Nguyen, and M. H. Nguyen, "A novel approach for phishing detection using url-based heuristic," in 2014 ComManTel, 2014, pp. 298--303.
[9]
O. Christou, N. Pitropakis, P. Papadopoulos, S. McKeown, and W. Buchanan, "Phishing url detection through top-level domain analysis: A descriptive approach," Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020.
[10]
R. Islam, B. Treves, M. O. Rokon, and M. Faloutsos, "HyperMan: Detecting misbehavior in online forums based on hyperlink posting behavior," in Social Network Analysis and Mining, vol. 12, no. 1, 2022.
[11]
D. Leprovost, L. Abrouk, and D. Gross-Amblard, "Discovering implicit communities in web forums through ontologies," Web Intelligence and Agent Systems: An International Journal, 2012.
[12]
T. Chomutare, E. Årsand, L. Fernandez-Luque, J. Lauritzen, and G. Hartvigsen, "Inferring community structure in healthcare forums," Methods of information in medicine, 2013.
[13]
E. Marin, J. Shakarian, and P. Shakarian, "Mining key-hackers on darkweb forums," 1st ICDIS, 2018.
[14]
Offensive community. [Online]. Available: http://offensivecommunity.net/
[15]
Ethical hacker. [Online]. Available: https://www.ethicalhacker.net/
[16]
Hack this site. [Online]. Available: https://www.hackthissite.org/
[17]
Wilder security. [Online]. Available: http://www.wilderssecurity.com/
[18]
Malware tips. [Online]. Available: http://www.malwaretips.com/
[19]
Tech republic. [Online]. Available: http://www.techrepublic.com/forums
[20]
J. Gharibshah, E. E. Papalexakis, and M. Faloutsos, "REST: A thread embedding approach for identifying and classifying user-specified information in security forums," in Proceedings of the International AAAI Conference on Web and Social Media, 2020.
[21]
M. L. McHugh, "Interrater reliability: The kappa statistic," Biochemia Medica, p. 276--282, 2012.
[22]
M. R. Masud, B. Treves, and M. Faloutsos, "GeekMAN: Geek-oriented username matching across online networks," in 2023 ASONAM, 2023.
[23]
T. Kuzman, N. Ljubešić, and I. Mozetič, "ChatGPT: beginning of an end of manual annotation? use case of automatic genre identification," arXiv preprint arXiv:2303.03953, 2023.
[24]
Gpt best practices. [Online]. Available: https://platform.openai.com/docs/guides/gpt-best-practices
[25]
J. Lever, M. Krzywinski, and N. Altman, "Points of significance: model selection and overfitting," Nature methods, vol. 13, 2016.
[26]
F. Johansson, L. Kaati, and A. Shrestha, "Timeprints for identifying social media users with multiple aliases," Security Informatics, 2015.
[27]
Y. Li, Z. Zhang, Y. Peng, H. Yin, and Q. Xu, "Matching user accounts based on user generated content across social networks," Future Generation Computer Systems, 2018.
[28]
F. Johansson, L. Kaati, and A. Shrestha, "Detecting multiple aliases in social media," in Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, 2013.
[29]
ACM Code of Ethics. [Online]. Available: https://www.acm.org/code-of-ethics
[30]
J. S. Li, L.-C. Chen, J. V. Monaco, P. Singh, and C. C. Tappert, "A comparison of classifiers and features for authorship authentication of social networking messages," Concurrency and Computation: Practice and Experience, 2017.
[31]
F. Alonso-Fernandez, N. M. S. Belvisi, K. Hernandez-Diaz, N. Muhammad, and J. Bigun, "Writer identification using microblogging texts for social media forensics," IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021.
[32]
A. Malhotra, L. Totti, W. Meira Jr, P. Kumaraguru, and V. Almeida, "Studying user footprints in different online social networks," in ASONAM, 2012.
[33]
H. Tupsamudre, A. K. Singh, and S. Lodha, "Everything is in the name-a url based approach for phishing detection," in International symposium on cyber security cryptography and machine learning. Springer, 2019.

Index Terms

  1. RURLMAN: Matching Forum Users Across Platforms Using Their Posted URLs
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASONAM '23: Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
        November 2023
        835 pages
        ISBN:9798400704093
        DOI:10.1145/3625007
        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 March 2024

        Check for updates

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        ASONAM '23
        Sponsor:

        Acceptance Rates

        ASONAM '23 Paper Acceptance Rate 53 of 145 submissions, 37%;
        Overall Acceptance Rate 116 of 549 submissions, 21%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 61
          Total Downloads
        • Downloads (Last 12 months)61
        • Downloads (Last 6 weeks)23
        Reflects downloads up to 22 Aug 2024

        Other Metrics

        Citations

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media