Skip to main content

Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan

  • Chapter
Intelligence and Security Informatics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 135))

  • 1068 Accesses

Abstract

Our society is in a state of transformation toward a “virtual society.” However, due to the nature of anonymity and less observability, internet activities have become more diverse and obscure. As a result, unscrupulous individuals or criminals may exploit the internet as a channel for their illegal activities to avoid the apprehension by law enforcement officials. This paper examines the “Gray Web Forums” in Taiwan. We study their characteristics and develop an analysis framework for assisting investigations on forum communities. Based on the statistical data collected from online forums, we found that the relationship between a posting and its responses is highly correlated to the forum nature. In addition, hot threads extracted based on posting activity and our proposed metric can be used to assist analysts in identifying illegal or inappropriate contents. Furthermore, a member’s role and his/her activities in a virtual community can be identified by member level analysis. In addition, two schemes based on content analysis were also developed to search for illegal information items in gray forums. The experiment results show that hot threads are correlated to illegal information items, but the retrieval effectiveness can be significantly improved by search schemes based on content analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barlow, J.P.: Crime and puzzlement. Whole Earth Review, 45–57 (1990)

    Google Scholar 

  2. Bock, W.: Christmas, Communities, and Cyberspace (2001), http://www.bockinfo.com/docs/community.htm

  3. Chen, H.: The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the Dark Web and Terrorism Research Resources, Sandia National Laboratories, August 14 (2003)

    Google Scholar 

  4. Donath, J.S.: Inhabiting the Virtual City: The design of social environments for electronic communities. MIT, Cambridge (1996)

    Google Scholar 

  5. Dringus, L.P., Ellis, T.: Using Data Mining as a Strategy for Assessing Asynchro-nous Discussion Forums. Computer & Education 45, 141–160 (2004)

    Article  Google Scholar 

  6. Elison, W.: Netwar: Studying Rebels on the Internet. The Social Studies 91, 127–131 (2000)

    Article  Google Scholar 

  7. Marcella, A.J., Greenfield, R.S.: Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. Auerbach Publications (2002)

    Google Scholar 

  8. Melbin, M.: Night as Frontier. Free Press, Glencoe (1987)

    Google Scholar 

  9. Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butter-worth Heinemann (2003)

    Google Scholar 

  10. Tsfati, Y., Weimann, G.: Terror on the Internet. Studies in Conflict & Terrorism 25, 317–332 (2002), http://www.terrorism.com

    Article  Google Scholar 

  11. Spaceman (2001), http://www.vbulletin.com/forum/showthread.php?t=32329

  12. Wang, J.H.: Cyber Forensics – Issues and Approaches. In: Managing Cyber Threats: Issues, Approaches and Challenge. Kluwer Academic Publishers, Dordrecht (2005)

    Google Scholar 

  13. Wang, J.H., et al.: A study of Automatic Search System on Cyber Crimes. Special Research Report to Telecommunication Bureau, Ministry of Traffic and Communication, Taiwan (1999)

    Google Scholar 

  14. Weimann, G.: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace (2004), www.terrorism.net , http://usip.org/pubs

  15. Wooley, D.R.: Forum Software for the Web: An independent guide to discussion forum & message board software (2006), http://www.thinkofit.com/webconf/forumsoft.htm

  16. Zhou, Y., Reid, E., Qin, J., Lai, G., Chen, H.: U.S. Domestic Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, Special Issue on Artificial Intelligence for National and Homeland Security 20(5), 44–51 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hsinchun Chen Christopher C. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Wang, JH., Fu, T., Lin, HM., Chen, H. (2008). Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. In: Chen, H., Yang, C.C. (eds) Intelligence and Security Informatics. Studies in Computational Intelligence, vol 135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69209-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69209-6_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69207-2

  • Online ISBN: 978-3-540-69209-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics