In search of light: detecting cybercrime through the analysis of unencrypted traffic on the TOR network

被引:0
|
作者
Gallo-Serpillo, Facundo [1 ]
Saldana-Taboada, Patricia [2 ]
机构
[1] Int Univ La Rioja, La Rioja, Spain
[2] Univ Granada, Criminal Law Dept, Granada, Spain
关键词
Cybercrime; cybersecurity; deep web; dark web; TOR;
D O I
10.1080/13600834.2025.2463715
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Since its inception, the TOR network has garnered criminological interest due to its association with criminal services and its ability to provide anonymity for accessing the Dark Web. While often linked to illicit activities, TOR was originally designed to protect user privacy, and there is no evidence it was created solely to facilitate crime. This study examines traffic routed from TOR to external services, aiming to assess its regular, non-criminal use. A technological method captures unencrypted traffic to analyse DNS queries made to the Surface Web, evaluating the geographical distribution, service volume, and digital reputation of the accessed pages. The findings challenge the notion that TOR is primarily used for criminal activities, revealing that most traffic is directed toward legitimate Internet services unrelated to illegal behaviour. This study provides a more balanced view of TOR's role in online privacy and crime prevention.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Detecting Encrypted and Unencrypted Network Data Using Entropy Analysis and Confidence Intervals
    Ticleanu, Oana-Adriana
    Popa, Teodora
    Hunyadi, Daniel Ioan
    Constantinescu, Nicolae
    ENTROPY, 2023, 25 (03)
  • [2] Methodology for Identification and Classifying of Cybercrime on Tor Network through the Use of Cryptocurrencies Based on Web Textual Contents
    Salas Conde, Julio Jesus
    Martin Ortiz, Manuel
    Carneiro Diaz, Victor Manuel
    COMPUTACION Y SISTEMAS, 2022, 26 (01): : 347 - 356
  • [3] Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning
    Li, Xue Jun
    Ma, Maode
    Yen, Yi Lin
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [4] Detecting policy violations through traffic analysis
    Horton, Jeffrey
    Safavi-Naini, Rei
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 109 - +
  • [5] Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic
    Jafarian, Jafar Haadi
    Abolfathi, Masoumeh
    Rahimian, Mahsa
    IEEE ACCESS, 2023, 11 : 20267 - 20283
  • [6] A Light-Weight Scheme for Detecting Component Structure of Network Traffic
    Wu, Zihui
    Xie, Yi
    Wu, Ziyang
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021, 2022, 13148 : 27 - 35
  • [7] TorBot Stalker: Detecting Tor Botnets through Intelligent Circuit Data Analysis
    Fajana, Oluwatobi
    Owenson, Gareth
    Cocea, Mihaela
    2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
  • [8] Detecting the urban traffic network structure dynamics through the growth and analysis of multi-layer networks
    Ding, Rui
    Ujang, Norsidah
    bin Hamid, Hussain
    Abd Manan, Mohd Shahrudin
    He, Yuou
    Li, Rong
    Wu, Jianjun
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 503 : 800 - 817
  • [9] A Method for Detecting Trojan Based on Hidden Network Traffic Analysis
    Chen, Zhiwen
    Tao, Yizheng
    Li, Gongliang
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 65 - 72
  • [10] A method for detecting Trojan based on hidden network traffic analysis
    Chen, Zhiwen
    Tao, Yizheng
    Li, Gongliang
    Communications in Computer and Information Science, 2014, 490 : 65 - 72