Title
Surfacing collaborated networks in dark web to find illicit and criminal content
Abstract
The Tor Network, a hidden part of the Internet, is becoming an ideal hosting ground for illegal activities and services, including large drug markets, financial frauds, espionage, child sexual abuse. Researchers and law enforcement rely on manual investigations, which are both time-consuming and ultimately inefficient. The first part of this paper explores illicit and criminal content identified by prominent researchers in the dark web. We previously developed a web crawler that automatically searched websites on the internet based on pre-defined keywords and followed the hyperlinks in order to create a map of the network. This crawler has demonstrated previous success in locating and extracting data on child exploitation images, videos, keywords and linkages on the public internet. However, as Tor functions differently at the TCP level, and uses socket connections, further technical challenges are faced when crawling Tor. Some of the other inherent challenges for advanced Tor crawling include scalability, content selection tradeoffs, and social obligation. We discuss these challenges and the measures taken to meet them. Our modified web crawler for Tor, termed the “Dark Crawler” has been able to access Tor while simultaneously accessing the public internet. We present initial findings regarding what extremist and terrorist contents are present in Tor and how this content is connected to each other in a mapped network that facilitates dark web crimes. Our results so far indicate the most popular websites in the dark web are acting as catalysts for dark web expansion by providing necessary knowledgebase, support and services to build Tor hidden services and onion websites.
Year
DOI
Venue
2016
10.1109/ISI.2016.7745452
2016 IEEE Conference on Intelligence and Security Informatics (ISI)
Keywords
Field
DocType
Tor Network,Web Crawler,Criminal Network,Dark Web,Web Graph,Social Network Analysis
Data mining,Internet privacy,Computer security,Computer science,Terrorism,Social responsibility,Hyperlink,Law enforcement,The Internet,World Wide Web,Crawling,Web crawler,Scalability
Conference
ISBN
Citations 
PageRank 
978-1-5090-3866-4
2
0.44
References 
Authors
5
5
Name
Order
Citations
PageRank
Ahmed T. Zulkarnine120.44
Richard Frank2205.61
Bryan Monk3112.45
Julianna Mitchell420.44
Garth Davies561.57