Home


The Anonymity of the Dark Web: A Survey #05

This is my personal note about the paper introduction. https://www.researchgate.net/publication/359421382_The_Anonymity_of_the_Dark_Web_A_Survey

This note is writing about overview of section 3 (THREAT INTELLIGENCE TECHNIQUES) on this paper.

Threat intelligence techniques

The architectural framework analysis process

Dark web forums monitoring

In this section present various security strategies by different cyber security researchers and scientists.

Marketplace's surveillance

Monitoring of dark websites

Traffic monitoring in the dark web

  1. Detection of tor related traffic
    • Cuzzocrea et al. describe a procedure using a machine learning technique and a basic rule of analyzing.
      • using Wireshark and the tcpdump tool
  2. Detection of malware
    • Han te al. proposed
      • The real-time detection of malware activities using online processing of the Glasso engine by analyzing dark web traffic.
  3. Detection of malign traffic
    • Kumar et al. proposed
      • A threat detection method by monitoring dark web traffic using machine learning classifier
  4. Darknet visibility
    1. Soro et al. deployed
      1. Three different darknets composed of IPv4 adresses in Brazil, the Netherlands, and Italy to identify darknet visibility facts.

Through Honeypot

Low Interaction

Medium Interaction

High Interaction

Researches