2020 APWG Symposium on Electronic Crime Research (eCrime) 2020
DOI: 10.1109/ecrime51433.2020.9493262
|View full text |Cite
|
Sign up to set email alerts
|

Phishing With A Darknet: Imitation of Onion Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…For a web crawler, a good selection of starting points (seed pages) is important. Many works use as seed a lists compiled by third parties [1,2,6,8,14,18,31,36,50,54], existing darknet search engines [1,2,18,31,50,54], or onion lists from previous works [2,4].…”
Section: Gathering Methods Of Onion Addressesmentioning
confidence: 99%
See 1 more Smart Citation
“…For a web crawler, a good selection of starting points (seed pages) is important. Many works use as seed a lists compiled by third parties [1,2,6,8,14,18,31,36,50,54], existing darknet search engines [1,2,18,31,50,54], or onion lists from previous works [2,4].…”
Section: Gathering Methods Of Onion Addressesmentioning
confidence: 99%
“…But marketplaces are also frequently duplicated. For example, the former Tor darknet marketplace AlphaBay was offered 165 times in a fake way under different onion addresses [6].…”
Section: Duplicates Of Onion Servicesmentioning
confidence: 99%
“…These attacks also require pre-existing fingerprints, limiting their applicability to known onion services. Fingerprint ambiguities due to factors like mirror websites [8,88] and characteristics of onion services can degrade precision [39,63]. Hence, an attack that can deanonymize IP addresses, eliminating exhaustive fingerprint collection, would be compelling, particularly when there is no prior knowledge of an onion service's existence.…”
Section: B Website Fingerprinting Of Tor Onion Servicesmentioning
confidence: 99%
“…Aforementioned clear web crawlers such as Nutch or Mercator cannot be used without modifications to proxy a connection to the Tor network. For this reason, contributions have been 6 https://github.com/internetarchive/heritrix3 made in academia to develop time efficient and powerful dark web crawlers for acquiring and analysing web content from Tor and other ACNs.…”
Section: E Dark Web Crawlersmentioning
confidence: 99%
“…Program language: Python. [6] Self-developed N/A Used a crawler to find Tor sites that were identical. Program language: Python.…”
Section: Articlementioning
confidence: 99%