Performance and security improvements for tor: A survey

M AlSabah, I Goldberg - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …

Not an'Ebay for Drugs': the Cryptomarket'Silk Road'as a paradigm shifting criminal innovation

J Aldridge, D Décary-Hétu - Available at SSRN 2436643, 2014 - papers.ssrn.com
Abstract The online cryptomarket Silk Road has been oft-characterised as an 'eBay for
drugs' with customers drug consumers making personal use-sized purchases. Our research …

Cryptopolitik and the Darknet

D Moore, T Rid - Survival, 2016 - Taylor & Francis
Full article: Cryptopolitik and the Darknet Skip to Main Content Taylor and Francis Online
homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home 2.All …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Classifying illegal activities on tor network based on web textual contents

MW Al Nabki, E Fidalgo, E Alegre… - Proceedings of the 15th …, 2017 - aclanthology.org
The freedom of the Deep Web offers a safe place where people can express themselves
anonymously but they also can conduct illegal activities. In this paper, we present and make …

Torank: Identifying the most influential suspicious domains in the tor network

MW Al-Nabki, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …

The not so dark side of the darknet: a qualitative study

M Mirea, V Wang, J Jung - Security Journal, 2019 - Springer
In recent years, the Darknet has become one of the most discussed topics in cyber security
circles. Current academic studies and media reports tend to highlight how the anonymous …

Criminal motivation on the dark web: A categorisation model for law enforcement

J Dalins, C Wilson, M Carman - Digital Investigation, 2018 - Elsevier
Research into the nature and structure of 'Dark Webs' such as Tor has largely focused upon
manually labelling a series of crawled sites against a series of categories, sometimes using …

[PDF][PDF] Inside Job: Applying Traffic Analysis to Measure Tor from Within.

R Jansen, M Juarez, R Galvez, T Elahi, C Diaz - NDSS, 2018 - homes.esat.kuleuven.be
In this paper, we explore traffic analysis attacks on Tor that are conducted solely with middle
relays rather than with relays from the entry or exit positions. We create a methodology to …

BlackWidow: Monitoring the dark web for cyber security information

M Schäfer, M Fuchs, M Strohmeier… - … on Cyber Conflict …, 2019 - ieeexplore.ieee.org
The Dark Web, a conglomerate of services hidden from search engines and regular users, is
used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web …