Skip to main content

TorBot: Open Source Intelligence Tool for Dark Web

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 89))

Abstract

The dark web has turned into a dominant source of illegal activities. With several volunteered networks, it is becoming more difficult to track down these services. Open source intelligence (OSINT) is a technique used to gather intelligence on targets by harvesting publicly available data. Performing OSINT on the Tor network makes it a challenge for both researchers and developers because of the complexity and anonymity of the network. This paper presents a tool which shows OSINT in the dark web. With the use of this tool, researchers and Law Enforcement Agencies can automate their task of crawling and identifying different services in the Tor network. This tool has several features which can help extract different intelligence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Glassman M, Kang MJ (2012) Intelligence in the internet age: the emergence and evolution of open source intelligence (OSINT). Comput Human Behav 28(2):673–682

    Article  Google Scholar 

  2. Bradbury D (2011) In plain view: open source intelligence. Comput Fraud Secur 2011(4):5–9

    Article  Google Scholar 

  3. Butler B, Wardman B, Pratt N (2016) Reaper: an automated, scalable solution for mass credential harvesting and OSINT. APWG Symp Electron Crime Res 1–10

    Google Scholar 

  4. Zantout B, Haraty RA (2014) I2P Data communication system I2P data communication system. April 2002

    Google Scholar 

  5. Qin J, Zhou Y, Lai G, Reid E, Sageman M, Chen H (2005) The dark web portal project: collecting and analyzing the presence of terrorist groups on the web. In: Proceedings of the 2005 IEEE international conference on intelligence and security informatics, pp 623–624

    Google Scholar 

  6. Moore D, Rid T (2016) Cryptopolitik and the Darknet. Survival 6(3):38

    Google Scholar 

  7. Weimann G (2016) Going dark: terrorism on the dark web. Stud Confl Terror 39(3):195–206

    Article  Google Scholar 

  8. Zulkarnine AT, Frank R, Monk B, Mitchell J, Davies G (2016) Surfacing collaborated networks in dark web to find illicit and criminal content. In: IEEE conference on intelligence and security informatics (ISI), pp 109–114

    Google Scholar 

  9. Minárik T, Osula A-M (2016) Tor does not stink: use and abuse of the Tor anonymity network from the perspective of law. Comput Law Secur Rev 32(1):111–127

    Article  Google Scholar 

  10. Loesing K, Murdoch SJ, Dingledine R (2010) A case study on measuring statistical data in the {T}or anonymity network. In: Proceedings of the workshop on ethics in computer security research (WECSR)

    Google Scholar 

  11. Nafziger B (2017) Data mining in the dark: Darknet intelligence automation

    Google Scholar 

  12. Sanchez-Rola I, Balzarotti D, Santos I (2017) The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services. In: Proceedings of the 26th international conference on world wide web, pp 1251–1260

    Google Scholar 

  13. Mouli VR, Jevitha KP (2016) Web services attacks and security-a systematic literature review. Proced Comput Sci 1(93):870–877

    Article  Google Scholar 

  14. Cova M, Felmetsger V, Vigna G (2007) Vulnerability analysis of web-based applications. In: Test and analysis of web services, Springer, Berlin, Heidelberg, pp 363–394

    Google Scholar 

  15. Holland BR (2012) Enabling open source intelligence (OSINT) in private social networks

    Google Scholar 

  16. Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Cryptogr. Mail. List https://www.metzdowd.com

  17. Wesam M, Nabki A, Fidalgo E, Alegre E, De Paz I (2017) Classifying illegal activities on Tor network based on web textual contents, vol 1, pp 35–43

    Google Scholar 

  18. Sathyadevan S, Gangadharan S (2014) Crime analysis and prediction using data mining. In: 2014 first international conference on networks and soft computing (ICNSC), August 19, IEEE, pp 406–412

    Google Scholar 

  19. Chau M, Chen H (2008) A machine learning approach to web page filtering using content and structure analysis. Decis supp syst 44(2):482–494

    Article  Google Scholar 

  20. Ani R, Jose J, Wilson M, Deepa OS (2018) Modified rotation forest ensemble classifier for medical diagnosis in decision support systems. In: Progress in advanced computing and intelligent engineering, Springer, Singapore, pp 137–146

    Google Scholar 

  21. Ani R, Augustine A, Akhil NC, Deepa OS (2016) Random forest ensemble classifier to predict the coronary heart disease using risk factors. In: Proceedings of the international conference on soft computing systems, Springer, New Delhi, pp 701–710

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. S. Narayanan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Narayanan, P.S., Ani, R., King, A.T.L. (2020). TorBot: Open Source Intelligence Tool for Dark Web. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics