DOI QR코드

DOI QR Code

A Deep Learning Approach for Identifying User Interest from Targeted Advertising

  • Kim, Wonkyung (Institute of Cyber Security & Privacy (ICSP), Korea University) ;
  • Lee, Kukheon (Institute of Cyber Security & Privacy (ICSP), Korea University) ;
  • Lee, Sangjin (Institute of Cyber Security & Privacy (ICSP), Korea University) ;
  • Jeong, Doowon (College of Police and Criminal Justice, Dongguk University)
  • Received : 2020.09.15
  • Accepted : 2020.12.17
  • Published : 2022.04.30

Abstract

In the Internet of Things (IoT) era, the types of devices used by one user are becoming more diverse and the number of devices is also increasing. However, a forensic investigator is restricted to exploit or collect all the user's devices; there are legal issues (e.g., privacy, jurisdiction) and technical issues (e.g., computing resources, the increase in storage capacity). Therefore, in the digital forensics field, it has been a challenge to acquire information that remains on the devices that could not be collected, by analyzing the seized devices. In this study, we focus on the fact that multiple devices share data through account synchronization of the online platform. We propose a novel way of identifying the user's interest through analyzing the remnants of targeted advertising which is provided based on the visited websites or search terms of logged-in users. We introduce a detailed methodology to pick out the targeted advertising from cache data and infer the user's interest using deep learning. In this process, an improved learning model considering the unique characteristics of advertisement is implemented. The experimental result demonstrates that the proposed method can effectively identify the user interest even though only one device is examined.

Keywords

Acknowledgement

This paper is recommended from 2020 International Conference on Big data, IoT, and Cloud Computing. This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-01000, Development of Digital Forensic Integration Platform).

References

  1. G. Palmer, "A road map for digital forensic research: report from the first digital forensic research workshop (DFRWS)," 2001 [Online]. Available: https://dfrws.org/wp-content/uploads/2019/06/2001_USA_a_road_map_for_digital_forensic_research.pdf
  2. J. Hou, Y. Li, J. Yu, and W. Shi, "A survey on digital forensics in Internet of Things," IEEE Internet of Things Journal, vol. 7, no. 1, pp. 1-15, 2019. https://doi.org/10.1109/jiot.2019.2940713
  3. A. Nieto and R. Rios, "Cybersecurity profiles based on human-centric IoT devices," Human-centric Computing and Information Sciences, vol. 9, article no. 39, 2019. https://doi.org/10.1186/s13673-019-0200-y
  4. H. Arshad, A. B. Jantan, and O. I. Abiodun, "Digital forensics: review of issues in scientific validation of digital evidence," Journal of Information Processing Systems, vol. 14, no. 2, pp. 346-376, 2018. https://doi.org/10.3745/JIPS.03.0095
  5. L. Caviglione, S. Wendzel, and W. Mazurczyk, "The future of digital forensics: challenges and the road ahead," IEEE Security & Privacy, vol. 15, no. 6, pp. 12-17, 2017. https://doi.org/10.1109/MSP.2017.4251117
  6. D. Jeong and S. Lee, "High-speed searching target data traces based on statistical sampling for digital forensics," IEEE Access, vol. 7, pp. 172264-172276, 2019. https://doi.org/10.1109/access.2019.2956681
  7. J. I. James and P. Gladyshev, "A survey of mutual legal assistance involving digital evidence," Digital Investigation, vol. 18, pp. 23-32, 2016. https://doi.org/10.1016/j.diin.2016.06.004
  8. N. M. Karie and H. S. Venter, "Taxonomy of challenges for digital forensics," Journal of Forensic Sciences, vol. 60, no. 4, pp. 885-893, 2015. https://doi.org/10.1111/1556-4029.12809
  9. A. Dehghantanha and K. Franke, "Privacy-respecting digital investigation," in Proceedings of 2014 12th Annual International Conference on Privacy, Security and Trust, Toronto, Canada, 2014, pp. 129-138.
  10. Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, and C. Wang, "Machine learning and deep learning methods for cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018. https://doi.org/10.1109/access.2018.2836950
  11. Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436-444, 2015. https://doi.org/10.1038/nature14539
  12. K. Chowdhary, "Natural language processing," in Fundamentals of Artificial Intelligence. New Delhi, India: Springer, 2020, pp. 603-649.
  13. J. Hirschberg and C. D. Manning, "Advances in natural language processing," Science, vol. 349, no. 6245, pp. 261-266, 2015. https://doi.org/10.1126/science.aaa8685
  14. H. Kox, B. Straathof, and G. Zwart, "Targeted advertising, platform competition, and privacy," Journal of Economics & Management Strategy, vol. 26, no. 3, pp. 557-570, 2017. https://doi.org/10.1111/jems.12200
  15. S. Q. Liu and A. S. Mattila, "Airbnb: online targeted advertising, sense of power, and consumer decisions," International Journal of Hospitality Management, vol. 60, pp. 33-41, 2017. https://doi.org/10.1016/j.ijhm.2016.09.012
  16. J. R. C. Nurse and O. Buckley, "Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem," Human-centric Computing and Information Sciences, vol. 7, article no. 40, 2017. https://doi.org/10.1186/s13673-017-0121-6
  17. M. Conti, V. Cozza, M. Petrocchi, and A. Spognardi, "TRAP: using targeted ads to unveil google personal profiles," in Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 2015, pp. 1-6.
  18. S. Dhelim, N. Aung, and H. Ning, "Mining user interest based on personality-aware hybrid filtering in social networks," Knowledge-Based Systems, vol. 206, article no. 106227, 2020. https://doi.org/10.1016/j.knosys.2020.106227
  19. J. Kang and H. Lee, "Modeling user interest in social media using news media and Wikipedia," Information Systems, vol. 65, pp. 52-64, 2017. https://doi.org/10.1016/j.is.2016.11.003
  20. X. Luo, J. Wang, Q. Shen, J. Wang, and Q. Qi, "User behavior analysis based on user interest by web log mining," in Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 2017, pp. 1-5.
  21. N. N. Diep, N. Van Tien, N. H. Anh, and T. M. Phuong, "An unsupervised method for web user interest analysis," in Proceedings of 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 2019, pp. 27-32.
  22. P. Siriaraya, Y. Yamaguchi, M. Morishita, Y. Inagaki, R. Nakamoto, J. Zhang, J. Aoi, and S. Nakajima, "Using categorized web browsing history to estimate the user's latent interests for web advertisement recommendation," in Proceedings of 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, 2017, pp. 4429-4434.
  23. E. B. Karbab and M. Debbabi, "MalDy: portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports," Digital Investigation, vol. 28, pp. S77-S87, 2019. https://doi.org/10.1016/j.diin.2019.01.017
  24. D. H. Lee, Y. R. Kim, H. J. Kim, S. M. Park, and Y. J. Yang, "Fake news detection using deep learning," Journal of Information Processing Systems, vol. 15, no. 5, pp. 1119-1130, 2019. https://doi.org/10.3745/jips.04.0142
  25. J. Salminen, M. Hopf, S. A. Chowdhury, S. G. Jung, H. Almerekhi, and B. J. Jansen, "Developing an online hate classifier for multiple social media platforms," Human-centric Computing and Information Sciences, vol. 10, article no. 1, 2020. https://doi.org/10.1186/s13673-019-0205-6
  26. E. Akbal, F. Gunes, and A. Akbal, "Digital forensic analyses of web browser records," Journal of Software, vol. 11, no. 7, pp. 631-637, 2016. https://doi.org/10.17706/jsw.11.7.631-637
  27. C. Flowers, A. Mansour, and H. M. Al-Khateeb, "Web browser artefacts in private and portable modes: a forensic investigation," International Journal of Electronic Security and Digital Forensics, vol. 8, no. 2, pp. 99-117, 2016. https://doi.org/10.1504/IJESDF.2016.075583
  28. D. Erhan, C. Szegedy, A. Toshev, and D. Anguelov, "Scalable object detection using deep neural networks," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, 2014, pp. 2155-2162.
  29. Facebook Research, "fastText," 2017 [Online]. Available: https://github.com/facebookresearch/fastText/
  30. Keras team, "Keras," 2021 [Online]. Available: https://github.com/keras-team/keras
  31. A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems, vol. 25, pp. 1097-1105, 2012.