Performance and security improvements for tor: A survey
M AlSabah, I Goldberg - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …
Not an'Ebay for Drugs': the Cryptomarket'Silk Road'as a paradigm shifting criminal innovation
J Aldridge, D Décary-Hétu - Available at SSRN 2436643, 2014 - papers.ssrn.com
Abstract The online cryptomarket Silk Road has been oft-characterised as an 'eBay for
drugs' with customers drug consumers making personal use-sized purchases. Our research …
drugs' with customers drug consumers making personal use-sized purchases. Our research …
Tor hidden services: A systematic literature review
DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …
communications, preventing censorship and traffic analysis. The most famous anonymous …
Classifying illegal activities on tor network based on web textual contents
The freedom of the Deep Web offers a safe place where people can express themselves
anonymously but they also can conduct illegal activities. In this paper, we present and make …
anonymously but they also can conduct illegal activities. In this paper, we present and make …
Torank: Identifying the most influential suspicious domains in the tor network
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …
The not so dark side of the darknet: a qualitative study
M Mirea, V Wang, J Jung - Security Journal, 2019 - Springer
In recent years, the Darknet has become one of the most discussed topics in cyber security
circles. Current academic studies and media reports tend to highlight how the anonymous …
circles. Current academic studies and media reports tend to highlight how the anonymous …
Criminal motivation on the dark web: A categorisation model for law enforcement
Research into the nature and structure of 'Dark Webs' such as Tor has largely focused upon
manually labelling a series of crawled sites against a series of categories, sometimes using …
manually labelling a series of crawled sites against a series of categories, sometimes using …
[PDF][PDF] Inside Job: Applying Traffic Analysis to Measure Tor from Within.
In this paper, we explore traffic analysis attacks on Tor that are conducted solely with middle
relays rather than with relays from the entry or exit positions. We create a methodology to …
relays rather than with relays from the entry or exit positions. We create a methodology to …
BlackWidow: Monitoring the dark web for cyber security information
M Schäfer, M Fuchs, M Strohmeier… - … on Cyber Conflict …, 2019 - ieeexplore.ieee.org
The Dark Web, a conglomerate of services hidden from search engines and regular users, is
used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web …
used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web …