Towards Analyzing Adversarial Behavior in Clandestine Networks