Structure and Content of the Visible Darknet

11/04/2018
by   Georgia Avarikioti, et al.
0

In this paper, we analyze the topology and the content found on the "darknet", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of the darknet is surprisingly well-connected through hub websites such as wikis and forums. We performed a comprehensive categorization of the content using supervised machine learning. We observe that about half of the visible dark web content is related to apparently licit activities based on our classifier. A significant amount of content pertains to software repositories, blogs, and activism-related websites. Among unlawful hidden services, most pertain to fraudulent websites, services selling counterfeit goods, and drug markets.

READ FULL TEXT

page 10

page 17

page 19

research
03/06/2018

Pathways to Fragmentation:User Flows and Web Distribution Infrastructures

This study analyzes how web audiences flow across online digital feature...
research
10/05/2019

Content-Based Features to Rank Influential Hidden Services of the Tor Darknet

The unevenness importance of criminal activities in the onion domains of...
research
02/05/2020

Demystifying content-blockers: A large scale study of actual performance gains

With the evolution of the online advertisement and tracking ecosystem, c...
research
04/08/2020

How Crisp is the Crease? A Subjective Study on Web Browsing Perception of Above-The-Fold

Quality of Experience (QoE) for various types of websites has gained sig...
research
10/20/2020

Grow your Business with Targeted Email List

Email Scraping Services is a very fast and supple #website scraper and e...
research
11/18/2019

A First Look at References from the Dark to Surface Web World

Tor is one of the most well-known networks that protects the identity of...
research
08/09/2019

Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)

The emergence of online services in our daily lives has been accompanied...

Please sign up or login with your details

Forgot password? Click here to reset