In search of light: detecting cybercrime through the analysis of unencrypted traffic on the TOR network

被引:0
|
作者
Gallo-Serpillo, Facundo [1 ]
Saldana-Taboada, Patricia [2 ]
机构
[1] Int Univ La Rioja, La Rioja, Spain
[2] Univ Granada, Criminal Law Dept, Granada, Spain
关键词
Cybercrime; cybersecurity; deep web; dark web; TOR;
D O I
10.1080/13600834.2025.2463715
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Since its inception, the TOR network has garnered criminological interest due to its association with criminal services and its ability to provide anonymity for accessing the Dark Web. While often linked to illicit activities, TOR was originally designed to protect user privacy, and there is no evidence it was created solely to facilitate crime. This study examines traffic routed from TOR to external services, aiming to assess its regular, non-criminal use. A technological method captures unencrypted traffic to analyse DNS queries made to the Surface Web, evaluating the geographical distribution, service volume, and digital reputation of the accessed pages. The findings challenge the notion that TOR is primarily used for criminal activities, revealing that most traffic is directed toward legitimate Internet services unrelated to illegal behaviour. This study provides a more balanced view of TOR's role in online privacy and crime prevention.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Queueing Analysis for Multifractal Traffic through Network Calculus and Global Scaling Parameter
    Teles Vieira, Flavio Henrique
    Lee, Luan Ling
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 181 - 186
  • [42] Behavioral analysis of malicious code through network traffic and system call monitoring
    Gregio, Andre R. A.
    Fernandes Filho, Dario S.
    Afonso, Vitor M.
    Santos, Rafael D. C.
    Jino, Mario
    de Geus, Paulo L.
    EVOLUTIONARY AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS V, 2011, 8059
  • [43] Behavioral analysis of malicious code through network traffic and system call monitoring
    Grégio, André R. A.
    Fernandes Filho, Dario S.
    Afonso, Vitor M.
    Santosc, Rafael D. C.
    Jinob, Mario
    De Geusb, Paulo L.
    Proceedings of SPIE - The International Society for Optical Engineering, 2011, 8059
  • [44] Anomaly-based model for detecting HTTP-tunnel traffic using network behavior analysis
    李世淙
    Yun Xiaochun
    Zhang Yongzheng
    High Technology Letters, 2014, 20 (01) : 63 - 69
  • [45] IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge
    Hafeez, Ibbad
    Antikainen, Markku
    Ding, Aaron Yi
    Tarkoma, Sasu
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01): : 45 - 59
  • [46] High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming
    Rathore, Mazhar
    Paul, Anand
    Ahmad, Awais
    Imran, Muhammad
    Guizani, Mohsen
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 595 - 598
  • [47] Detecting pancreatic cancer through neural network analysis of human plasma MR spectra
    Solaiyappan, Meiyappan
    Bharti, Santosh Kumar
    Winnard, Paul T.
    Dbouk, Mohamad
    Goggins, Michael G.
    Bhujwalla, Zaver M.
    CANCER RESEARCH, 2020, 80 (16)
  • [48] A framework of enroute air traffic conflict detection and resolution through complex network analysis
    Chen, Xin W.
    Landry, Steven J.
    Nof, Shimon Y.
    COMPUTERS IN INDUSTRY, 2011, 62 (8-9) : 787 - 794
  • [49] BotCapturer: Detecting botnets based on two-layered analysis with graph anomaly detection and network traffic clustering
    Wang W.
    Wang Y.
    Tan X.
    Liu Y.
    Yang S.
    Wang, Wei (wangwei1@bjtu.edu.cn), 2018, Totem Publishers Ltd (14) : 1050 - 1059
  • [50] Network Analysis of Third Party Tracking User Exposure to Tracking Cookies through Search
    Gomer, Richard
    Rodrigues, Eduarda Mendes
    Milic-Frayling, Natasa
    Schraefel, M. C.
    2013 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 1, 2013, : 549 - 556