Abstract
The dark web has turned into a dominant source of illegal activities. With several volunteered networks, it is becoming more difficult to track down these services. Open source intelligence (OSINT) is a technique used to gather intelligence on targets by harvesting publicly available data. Performing OSINT on the Tor network makes it a challenge for both researchers and developers because of the complexity and anonymity of the network. This paper presents a tool which shows OSINT in the dark web. With the use of this tool, researchers and Law Enforcement Agencies can automate their task of crawling and identifying different services in the Tor network. This tool has several features which can help extract different intelligence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Glassman M, Kang MJ (2012) Intelligence in the internet age: the emergence and evolution of open source intelligence (OSINT). Comput Human Behav 28(2):673–682
Bradbury D (2011) In plain view: open source intelligence. Comput Fraud Secur 2011(4):5–9
Butler B, Wardman B, Pratt N (2016) Reaper: an automated, scalable solution for mass credential harvesting and OSINT. APWG Symp Electron Crime Res 1–10
Zantout B, Haraty RA (2014) I2P Data communication system I2P data communication system. April 2002
Qin J, Zhou Y, Lai G, Reid E, Sageman M, Chen H (2005) The dark web portal project: collecting and analyzing the presence of terrorist groups on the web. In: Proceedings of the 2005 IEEE international conference on intelligence and security informatics, pp 623–624
Moore D, Rid T (2016) Cryptopolitik and the Darknet. Survival 6(3):38
Weimann G (2016) Going dark: terrorism on the dark web. Stud Confl Terror 39(3):195–206
Zulkarnine AT, Frank R, Monk B, Mitchell J, Davies G (2016) Surfacing collaborated networks in dark web to find illicit and criminal content. In: IEEE conference on intelligence and security informatics (ISI), pp 109–114
Minárik T, Osula A-M (2016) Tor does not stink: use and abuse of the Tor anonymity network from the perspective of law. Comput Law Secur Rev 32(1):111–127
Loesing K, Murdoch SJ, Dingledine R (2010) A case study on measuring statistical data in the {T}or anonymity network. In: Proceedings of the workshop on ethics in computer security research (WECSR)
Nafziger B (2017) Data mining in the dark: Darknet intelligence automation
Sanchez-Rola I, Balzarotti D, Santos I (2017) The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services. In: Proceedings of the 26th international conference on world wide web, pp 1251–1260
Mouli VR, Jevitha KP (2016) Web services attacks and security-a systematic literature review. Proced Comput Sci 1(93):870–877
Cova M, Felmetsger V, Vigna G (2007) Vulnerability analysis of web-based applications. In: Test and analysis of web services, Springer, Berlin, Heidelberg, pp 363–394
Holland BR (2012) Enabling open source intelligence (OSINT) in private social networks
Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Cryptogr. Mail. List https://www.metzdowd.com
Wesam M, Nabki A, Fidalgo E, Alegre E, De Paz I (2017) Classifying illegal activities on Tor network based on web textual contents, vol 1, pp 35–43
Sathyadevan S, Gangadharan S (2014) Crime analysis and prediction using data mining. In: 2014 first international conference on networks and soft computing (ICNSC), August 19, IEEE, pp 406–412
Chau M, Chen H (2008) A machine learning approach to web page filtering using content and structure analysis. Decis supp syst 44(2):482–494
Ani R, Jose J, Wilson M, Deepa OS (2018) Modified rotation forest ensemble classifier for medical diagnosis in decision support systems. In: Progress in advanced computing and intelligent engineering, Springer, Singapore, pp 137–146
Ani R, Augustine A, Akhil NC, Deepa OS (2016) Random forest ensemble classifier to predict the coronary heart disease using risk factors. In: Proceedings of the international conference on soft computing systems, Springer, New Delhi, pp 701–710
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Narayanan, P.S., Ani, R., King, A.T.L. (2020). TorBot: Open Source Intelligence Tool for Dark Web. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-0146-3_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0145-6
Online ISBN: 978-981-15-0146-3
eBook Packages: EngineeringEngineering (R0)