Title | Surfacing collaborated networks in dark web to find illicit and criminal content |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Zulkarnine, A. T., Frank, R., Monk, B., Mitchell, J., Davies, G. |
Conference Name | 2016 IEEE Conference on Intelligence and Security Informatics (ISI) |
Keywords | automatic Web site searching, child exploitation images, child exploitation videos, child sexual abuse, collaborated networks, Computer crime, content selection, Crawlers, criminal content, Criminal Network, Dark Crawler, dark web, dark Web crimes, Databases, drug markets, drugs, espionage, extremist contents, financial frauds, Human Behavior, human factors, hyperlinks, illegal activities, illegal services, illicit content, information retrieval, Internet, knowledge base, law enforcement, onion Web sites, pubcrawl, public Internet, social network analysis, social networking (online), social obligation, socket connections, Terrorism, terrorist contents, text analysis, Tor crawling, Tor functions, Tor hidden services, Tor network, Weapons, Web crawler, Web Graph |
Abstract | The Tor Network, a hidden part of the Internet, is becoming an ideal hosting ground for illegal activities and services, including large drug markets, financial frauds, espionage, child sexual abuse. Researchers and law enforcement rely on manual investigations, which are both time-consuming and ultimately inefficient. The first part of this paper explores illicit and criminal content identified by prominent researchers in the dark web. We previously developed a web crawler that automatically searched websites on the internet based on pre-defined keywords and followed the hyperlinks in order to create a map of the network. This crawler has demonstrated previous success in locating and extracting data on child exploitation images, videos, keywords and linkages on the public internet. However, as Tor functions differently at the TCP level, and uses socket connections, further technical challenges are faced when crawling Tor. Some of the other inherent challenges for advanced Tor crawling include scalability, content selection tradeoffs, and social obligation. We discuss these challenges and the measures taken to meet them. Our modified web crawler for Tor, termed the "Dark Crawler" has been able to access Tor while simultaneously accessing the public internet. We present initial findings regarding what extremist and terrorist contents are present in Tor and how this content is connected to each other in a mapped network that facilitates dark web crimes. Our results so far indicate the most popular websites in the dark web are acting as catalysts for dark web expansion by providing necessary knowledgebase, support and services to build Tor hidden services and onion websites. |
DOI | 10.1109/ISI.2016.7745452 |
Citation Key | zulkarnine_surfacing_2016 |