2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2019
DOI: 10.1109/imcec46724.2019.8984106
|View full text |Cite
|
Sign up to set email alerts
|

Hadoop-based Dark Web Threat Intelligence Analysis Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The encrypted information is placed between the relays. Tor traffic as a whole passes through three relays and then it is forwarded to the final destination [14]. This mechanism ensures perfect forward secrecy between the nodes and the hidden services of Tor, while at the same time it routinely communicates through Tor nodes (consensus) operated by volunteers around the world.…”
Section: Literature Reviewsmentioning
confidence: 99%
See 1 more Smart Citation
“…The encrypted information is placed between the relays. Tor traffic as a whole passes through three relays and then it is forwarded to the final destination [14]. This mechanism ensures perfect forward secrecy between the nodes and the hidden services of Tor, while at the same time it routinely communicates through Tor nodes (consensus) operated by volunteers around the world.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…Yang et al [26] introduce the current mainstream dark network communication system TOR and develop a visual dark web forum post association analysis system to graphically display the relationship between various forum messages and posters, which helps analysts to explore deep levels. In addition, another paper [14] designs a framework based on Hadoop in hidden threat intelligence. The framework uses a Hadoop database-based (HBase-based) distributed database to store and manage threat intelligence information, and a web crawler is used to collect data through the anonymous TOR tool in order to identify the characteristics of key dark network criminal networks, which is the basis for the later dark network research.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…A Hadoop-based framework was designed in 2019 to identify the individualities of dark network criminals' networks using HDFS as a database and web crawler storage system to collect Tor data [69]. The author has discussed dark web threats via Hadoop-based intelligence analysis framework by:…”
Section: Monitoring Of Dark Websitesmentioning
confidence: 99%
“…Zhang Xuan, a member of the Shandong Police College, and the Secretary of the Department of Information Security and Cryptography (CISC) of the University of Hong Kong, Professor Jinpei ou, co-published the Dark Net Threat Intelligence Analysis Framework, which proposes a concept of a hidden threat intelligence analysis framework. To help analyze crime traces in the dark network [27,28].…”
Section: Related Research Studymentioning
confidence: 99%
“…After classifying and clustering the captured data, the characteristics of the special participants can be extracted. Through the social network analysis method, the social interaction mode with other cybercrime, the type of content published, and the frequency of discussion of the participating topics can be obtained [27].…”
Section: Introductionmentioning
confidence: 99%