In search of light: detecting cybercrime through the analysis of unencrypted traffic on the TOR network

被引:0
|
作者
Gallo-Serpillo, Facundo [1 ]
Saldana-Taboada, Patricia [2 ]
机构
[1] Int Univ La Rioja, La Rioja, Spain
[2] Univ Granada, Criminal Law Dept, Granada, Spain
关键词
Cybercrime; cybersecurity; deep web; dark web; TOR;
D O I
10.1080/13600834.2025.2463715
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Since its inception, the TOR network has garnered criminological interest due to its association with criminal services and its ability to provide anonymity for accessing the Dark Web. While often linked to illicit activities, TOR was originally designed to protect user privacy, and there is no evidence it was created solely to facilitate crime. This study examines traffic routed from TOR to external services, aiming to assess its regular, non-criminal use. A technological method captures unencrypted traffic to analyse DNS queries made to the Surface Web, evaluating the geographical distribution, service volume, and digital reputation of the accessed pages. The findings challenge the notion that TOR is primarily used for criminal activities, revealing that most traffic is directed toward legitimate Internet services unrelated to illegal behaviour. This study provides a more balanced view of TOR's role in online privacy and crime prevention.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] IoT Devices Recognition Through Network Traffic Analysis
    Shahid, Mustafizur R.
    Blanc, Gregory
    Zhang, Zonghua
    Debar, Herve
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5187 - 5192
  • [22] Network Encrypted Traffic Side-channel Analysis on Chinese Search
    Li Ding
    Lin Wei
    Lu Bin
    Zhu Yuefei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (05) : 1763 - 1772
  • [23] Visual Analysis of Distributed Search Traffic in a Peer-to-peer Network
    Ke, Weimao
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 189 - 194
  • [24] Detecting DGA-Based Botnet with DNS Traffic Analysis in Monitored Network
    Dinh-Tu Truong
    Cheng, Guang
    Jakalan, Ahmad
    Guo, Xiaojun
    Zhou, Aiping
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 217 - 230
  • [25] Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic
    Department of Computer Sciences, City University of Science and Information Technology, Peshawar, Pakistan
    不详
    Int. J. Comput. Sci. Issues, 1600, 2 (259-265):
  • [26] Detecting the dynamics of urban structure through spatial network analysis
    Zhong, Chen
    Arisona, Stefan Mueller
    Huang, Xianfeng
    Batty, Michael
    Schmitt, Gerhard
    INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE, 2014, 28 (11) : 2178 - 2199
  • [27] Statistical Analysis of Network Traffic over LAN through IAMT
    Srivastava, Shashank
    Goyal, Abhinav
    Kumar, Rajeev
    Nandi, G. C.
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 329 - 335
  • [28] SNAPS: Semantic Network traffic Analysis through Projection and Selection
    Cappers, Bram C. M.
    van Wijk, Jarke J.
    2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2015,
  • [29] Detecting Video Surveillance Systems in Real-Time through Wireless Traffic Analysis
    An, Hyeyoung
    Park, Woojin
    Park, Soochang
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1508 - 1509
  • [30] Detecting Potential Design Weaknesses in SHADE Through Network Feature Analysis
    Viktorin, Adam
    Pluhacek, Michal
    Senkerik, Roman
    Kadavy, Tomas
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2017, 2017, 10334 : 662 - 673