{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T08:10:53Z","timestamp":1768810253607,"version":"3.49.0"},"reference-count":38,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902265"],"award-info":[{"award-number":["61902265"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"sichuan province science and technology support program","doi-asserted-by":"publisher","award":["2019YFG0407"],"award-info":[{"award-number":["2019YFG0407"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"sichuan province science and technology support program","doi-asserted-by":"publisher","award":["2020YFG0047"],"award-info":[{"award-number":["2020YFG0047"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"fundamental research funds for the central universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS201921"],"award-info":[{"award-number":["GCIS201921"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2021,5]]},"abstract":"<jats:p> With the rapid development of the Internet, cybersecurity situation is becoming more and more complex. At present, surface web and dark web contain numerous underground forums or markets, which play an important role in cybercrime ecosystem. Therefore, cybersecurity researchers usually focus on hacker-centered research on cybercrime, trying to find key hackers and extract credible cyber threat intelligence from them. The data scale of underground forums is tremendous and key hackers only represent a small fraction of underground forum users. It takes a lot of time as well as expertise to manually analyze key hackers. Therefore, it is necessary to propose a method or tool to automatically analyze underground forums and identify key hackers involved. In this work, we present HackerRank, an automatic method for identifying key hackers. HackerRank combines the advantages of content analysis and social network analysis. First, comprehensive evaluations and topic preferences are extracted separately using content analysis. Then, it uses an improved Topic-specific PageRank to combine the results of content analysis with social network analysis. Finally, HackerRank obtains users\u2019 ranking, with higher-ranked users being considered as key hackers. To demonstrate the validity of proposed method, we applied HackerRank to five different underground forums separately. Compared to using social network analysis and content analysis alone, HackerRank increases the coverage rate of five underground forums by 3.14% and 16.19% on average. In addition, we performed a manual analysis of identified key hackers. The results prove that the method is effective in identifying key hackers in underground forums. <\/jats:p>","DOI":"10.1177\/15501477211015145","type":"journal-article","created":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T06:32:12Z","timestamp":1620541932000},"page":"155014772110151","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":27,"title":["HackerRank: Identifying key hackers in underground forums"],"prefix":"10.1177","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5871-946X","authenticated-orcid":false,"given":"Cheng","family":"Huang","sequence":"first","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, China"},{"name":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6623-7201","authenticated-orcid":false,"given":"Yongyan","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, China"}]},{"given":"Wenbo","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, China"}]},{"given":"Ying","family":"Li","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, China"}]}],"member":"179","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"bibr1-15501477211015145","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"issue":"3","key":"bibr3-15501477211015145","first-page":"71","volume":"8","author":"Algarni A","year":"2014","journal-title":"Int J Comput Inf Sci Eng"},{"key":"bibr4-15501477211015145","first-page":"926","volume-title":"Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining","author":"Macdonald M"},{"issue":"1","key":"bibr5-15501477211015145","doi-asserted-by":"crossref","first-page":"73","DOI":"10.25300\/MISQ\/2019\/13042","volume":"43","author":"Yue WT","year":"2019","journal-title":"MIS Quart"},{"key":"bibr6-15501477211015145","first-page":"7","volume-title":"2016 IEEE conference on intelligence and security informatics (ISI)","author":"Nunes E"},{"key":"bibr7-15501477211015145","first-page":"73","volume-title":"2018 1st international conference on data intelligence and security (ICDIS)","author":"Marin E"},{"key":"bibr8-15501477211015145","first-page":"13","volume-title":"2016 IEEE conference on intelligence and security informatics (ISI)","author":"Fang Z"},{"key":"bibr9-15501477211015145","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9567-0"},{"key":"bibr10-15501477211015145","first-page":"154","volume-title":"2018 IEEE international conference on big knowledge (ICBK)","author":"Zhang Y"},{"key":"bibr11-15501477211015145","first-page":"13","volume-title":"2017 IEEE international conference on intelligence and security informatics (ISI)","author":"Grisham J"},{"key":"bibr12-15501477211015145","first-page":"319","volume-title":"2016 IEEE conference on intelligence and security informatics (ISI)","author":"Samtani S"},{"key":"bibr13-15501477211015145","first-page":"70","volume-title":"2018 IEEE international conference on intelligence and security informatics (ISI)","author":"Du PY"},{"key":"bibr14-15501477211015145","first-page":"19","volume-title":"2016 IEEE conference on intelligence and security informatics (ISI)","author":"Samtani S"},{"key":"bibr15-15501477211015145","first-page":"31","volume-title":"2015 IEEE international conference on intelligence and security informatics (ISI)","author":"Samtani S"},{"key":"bibr16-15501477211015145","first-page":"3648","volume-title":"2017 IEEE international conference on big data (Big Data)","author":"Deliu I"},{"key":"bibr17-15501477211015145","first-page":"85","volume-title":"2015 IEEE international conference on intelligence and security informatics (ISI)","author":"Benjamin V"},{"key":"bibr18-15501477211015145","first-page":"56","volume-title":"2014 IEEE joint intelligence and security informatics conference","author":"Abbasi A"},{"key":"bibr19-15501477211015145","first-page":"24","volume-title":"2012 IEEE international conference on intelligence and security informatics","author":"Benjamin V"},{"key":"bibr20-15501477211015145","doi-asserted-by":"publisher","DOI":"10.1177\/0894439320924735."},{"key":"bibr21-15501477211015145","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1267528"},{"key":"bibr22-15501477211015145","first-page":"106","volume-title":"SIGBPS workshop on business processes and service","author":"Zhang X"},{"issue":"2","key":"bibr23-15501477211015145","first-page":"31","volume":"51","author":"Lu Y","year":"2010","journal-title":"J Comput Inform Syst"},{"key":"bibr24-15501477211015145","first-page":"84","volume-title":"2014 IEEE security and privacy workshops","author":"Sarvari H"},{"key":"bibr25-15501477211015145","first-page":"549","volume-title":"Proceedings of the 28th ACM international conference on information and knowledge management","author":"Zhang Y"},{"key":"bibr26-15501477211015145","first-page":"484","volume-title":"2020 IEEE European symposium on security and privacy workshops (EuroS&PW)","author":"Pete I"},{"key":"bibr27-15501477211015145","author":"Loper E","year":"2002","journal-title":"arXiv preprint cs\/"},{"key":"bibr28-15501477211015145","first-page":"45","volume-title":"Proceedings of the fourth ACM international conference on web search and data mining","author":"Pal A"},{"key":"bibr29-15501477211015145","first-page":"183","volume-title":"Proceedings of the 2008 international conference on web search and data mining","author":"Agichtein E"},{"key":"bibr30-15501477211015145","first-page":"208","volume-title":"2019 18th IEEE international conference on trust, security and privacy in computing and communications\/13th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE)","author":"Huang SY"},{"key":"bibr31-15501477211015145","first-page":"755","volume-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","author":"Liao X"},{"key":"bibr32-15501477211015145","first-page":"163","volume-title":"2011 international conference on computational aspects of social networks (CASoN)","author":"Cruz JD"},{"key":"bibr33-15501477211015145","first-page":"993","volume":"3","author":"Blei DM","year":"2003","journal-title":"J Mach Learn Res"},{"key":"bibr34-15501477211015145","first-page":"100","volume-title":"Human language technologies: the 2010 annual conference of the North American chapter of the association for computational linguistics","author":"Newman D"},{"key":"bibr35-15501477211015145","first-page":"262","volume-title":"Proceedings of the 2011 conference on empirical methods in natural language processing","author":"Mimno D"},{"key":"bibr36-15501477211015145","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1208999"},{"key":"bibr37-15501477211015145","first-page":"261","volume-title":"Proceedings of the third ACM international conference on web search and data mining","author":"Weng J"},{"key":"bibr38-15501477211015145","first-page":"187","volume-title":"Proceedings of the 22nd international conference on world wide web","author":"Miao Q"},{"key":"bibr39-15501477211015145","first-page":"971","volume-title":"Proceedings of the sixteenth ACM conference on information and knowledge management","author":"Song X"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/15501477211015145","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/15501477211015145","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/15501477211015145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T06:33:03Z","timestamp":1620541983000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/15501477211015145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10.1177\/15501477211015145"],"URL":"https:\/\/doi.org\/10.1177\/15501477211015145","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}