Proceedings of 2020 6th International Conference on Computing and Data Engineering 2020
DOI: 10.1145/3379247.3379272
|View full text |Cite
|
Sign up to set email alerts
|

Crawling and Analysis of Dark Network Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Accuracy testing was employed to evaluate the URL content obtained from crawling in relation to the input keywords. This analysis also considered the impact of Regex Text from research [13], Regex Wildcard, and Regex Option on the collected data. The accuracy analysis was performed on the data obtained from the same scenario as the performance testing, where each URL was tested ten times using three distinct keyword processing methods.…”
Section: Accuracy Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Accuracy testing was employed to evaluate the URL content obtained from crawling in relation to the input keywords. This analysis also considered the impact of Regex Text from research [13], Regex Wildcard, and Regex Option on the collected data. The accuracy analysis was performed on the data obtained from the same scenario as the performance testing, where each URL was tested ten times using three distinct keyword processing methods.…”
Section: Accuracy Testingmentioning
confidence: 99%
“…Most research in this area proposed a crawler that digs down the dark web to obtain a comprehensive database for topic profiling and classification. This kind of research can be seen in research of Pannu et al [12] for creating a database of suspicious websites, Alkhatib et al [6] for market structure and product summary, Yang et al [13] for hidden threat intelligence, Lee at el. [14] to uncover types of cyber-criminal activities occurring in South Korea, Shiaeles et al [15] for monitoring and analysis of attack trends in the IoT ecosystem, Shinde et al [16] to uncover child and women abuse materials, Alharbi et al [17] to analyze the Tor dark web graph's internal structure and connectivity.…”
Section: Introductionmentioning
confidence: 99%
“…Program language: Python. [104] Self-developed N/A Used a Selenium based crawler to classify Tor websites. Program language: Python.…”
Section: Articlementioning
confidence: 99%