A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

[HTML][HTML] On the gathering of tor onion addresses

J Pastor-Galindo, FG Mármol, GM Pérez - Future Generation Computer …, 2023 - Elsevier
Exploring the Tor network requires acquiring onion addresses, which are crucial for
accessing anonymous websites. However, the Tor protocol presents a challenge, as it lacks …

A survey of the dark web and dark market research

H Zhang, F Zou - 2020 IEEE 6th international conference on …, 2020 - ieeexplore.ieee.org
The Dark Web is a web-based content based on anonymous communication systems that
protects users and protects anonymity through technologies such as traffic encryption …

Exploring the topological properties of the Tor Dark Web

A Alharbi, M Faizan, W Alosaimi, H Alyami… - IEEE …, 2021 - ieeexplore.ieee.org
The web graph can be used to get insight into the internal structure and connectivity of the
Tor dark web. This paper analyzes the internal structure of the Tor dark web graph and …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

Spiders like onions: on the network of tor hidden services

M Bernaschi, A Celestini, S Guarino… - The World Wide Web …, 2019 - dl.acm.org
Tor hidden services allow offering and accessing various Internet resources while
guaranteeing a high degree of provider and user anonymity. So far, most research work on …

[PDF][PDF] A comprehensive survey of recent internet measurement techniques for cyber security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

[PDF][PDF] Darkweb research: Past, present, and future trends and mapping to sustainable development goals

R Rama, VK Nair, P Nedungadi, I Ray, K Achuthan - Heliyon, 2023 - cell.com
The Darkweb, part of the deep web, can be accessed only through specialized computer
software and used for illegal activities such as cybercrime, drug trafficking, and exploitation …

Supervised ranking approach to identify infLuential websites in the darknet

MHDW Al Nabki, E Fidalgo, E Alegre, D Chaves - Applied Intelligence, 2023 - Springer
The anonymity and high security of the Tor network allow it to host a significant amount of
criminal activities. Some Tor domains attract more traffic than others, as they offer better …