2018 IEEE Conference on Dependable and Secure Computing (DSC) 2018
DOI: 10.1109/desec.2018.8625103
|View full text |Cite
|
Sign up to set email alerts
|

Improving Tor Hidden Service Crawler Performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 9 publications
0
7
0
1
Order By: Relevance
“…In the work of [5], they presented a TOR hidden service crawling method that can monitor the status of the onion pages in the TOR network for content analysis. They developed TOR crawling software with Docker support.…”
Section: Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…In the work of [5], they presented a TOR hidden service crawling method that can monitor the status of the onion pages in the TOR network for content analysis. They developed TOR crawling software with Docker support.…”
Section: Literaturementioning
confidence: 99%
“…In addition, it is necessary to monitor Tor traffic in order to uncover illegal activities and to create related measures. For this purpose, numerous crawler software are being developed [3,4,5]. This softwares send requests to the seed onion address which is given them as a parameter and download the content of that address if the connection is provided.…”
Section: Introductionmentioning
confidence: 99%
“…Later, the growing risk of the suspicious activities practiced on the Darknet called the attention of researchers to dive into this network and explore its content (Graczyk and Kinningham, 2015;Moore and Rid, 2016;Park et al, 2018;Dalins et al, 2018;Dong et al, 2018;Takaaki and Atsuo, 2019;Al-Nabki et al, 2019c). Concerning the Deep Web, Xu et al (2007) presented a supervised text classification framework and used Information Gain (IG) to extract features from the text.…”
Section: Supervised Classification Techniquesmentioning
confidence: 99%
“…Recently, Dalins et al (2018) presented a novel model, named Tor-use Motivation Model (TMM), to classify the hidden services of the Tor network with greater granularity. Park et al (2018) build a parallel Tor browsers framework to improve the crawling process of the Tor domains. He et al (2019) proposed a supervised classifier for the illegal activities in the Darknet of the Tor network using the TF-IDF technique and NB classifier.…”
Section: Supervised Classification Techniquesmentioning
confidence: 99%
See 1 more Smart Citation