“…Later, Sanchez et al [31] re-analyzed the content of hidden services and found that there is a clear connection between the normal network or surface web and many Hidden Services, for example, claiming that more than 20% of the domains in Tor imported resources from the surface web. Furthermore, they confirm the results obtained by Betzwieser [74] and show that approximately 90% of onion services are interconnected.…”
Section: Discovery and Measurementsupporting
confidence: 89%
“…Very few of the investigations studied coincide with each other, there are usually many differences, for example, in the number of hidden servers found, while some discover 20,499 [74] others manage to find approximate 80 thousand HSs with 45 thousand of these being persistent [32]. Therefore, there are many inconsistencies between the results obtained.…”
Section: What Are the Limitations That Research Work Present And In Which Research Lines There Is Not Enough Research Regarding Ths?mentioning
confidence: 82%
“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
“…The first document is from 2009 [74] and their authors (Betzwieser2009 et al) are the first researchers to mention that the dark network is widely interconnected, manually locating 39 hidden services, including directory sites, and from these 39, they find 20,499 more HSs. Later, this concept is taken up again in 2017 by Bernaschi et al [23] but they show that the THS that offer specific services contain few or no references to other THS, while those that advertise and link to a large number of other pages, are much more likely to be known and accessible from public websites.…”
Anonymous communications networks were born to protect the privacy of our communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features, among them, we can mention user’s IP location or Tor Hidden Services (THS) as a mechanism to conceal the location of servers, mainly, web servers. THS is an important research field in Tor. However, there is a lack of reviews that sump up main findings and research challenges. In this article we present a systematic literature review that aims to offer a comprehensive view on the research made on Tor Hidden services presenting the state of the art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and present main findings and advances regarding Tor Hidden Services, limitations found, and future issues to be investigated.
“…Later, Sanchez et al [31] re-analyzed the content of hidden services and found that there is a clear connection between the normal network or surface web and many Hidden Services, for example, claiming that more than 20% of the domains in Tor imported resources from the surface web. Furthermore, they confirm the results obtained by Betzwieser [74] and show that approximately 90% of onion services are interconnected.…”
Section: Discovery and Measurementsupporting
confidence: 89%
“…Very few of the investigations studied coincide with each other, there are usually many differences, for example, in the number of hidden servers found, while some discover 20,499 [74] others manage to find approximate 80 thousand HSs with 45 thousand of these being persistent [32]. Therefore, there are many inconsistencies between the results obtained.…”
Section: What Are the Limitations That Research Work Present And In Which Research Lines There Is Not Enough Research Regarding Ths?mentioning
confidence: 82%
“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
“…The first document is from 2009 [74] and their authors (Betzwieser2009 et al) are the first researchers to mention that the dark network is widely interconnected, manually locating 39 hidden services, including directory sites, and from these 39, they find 20,499 more HSs. Later, this concept is taken up again in 2017 by Bernaschi et al [23] but they show that the THS that offer specific services contain few or no references to other THS, while those that advertise and link to a large number of other pages, are much more likely to be known and accessible from public websites.…”
Anonymous communications networks were born to protect the privacy of our communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features, among them, we can mention user’s IP location or Tor Hidden Services (THS) as a mechanism to conceal the location of servers, mainly, web servers. THS is an important research field in Tor. However, there is a lack of reviews that sump up main findings and research challenges. In this article we present a systematic literature review that aims to offer a comprehensive view on the research made on Tor Hidden services presenting the state of the art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and present main findings and advances regarding Tor Hidden Services, limitations found, and future issues to be investigated.
“…The first document is from 2009 [81], and Betzwieser et al were the first researchers to mention that the dark network is widely interconnected. They manually located 39 hidden services, including directory sites, and from those 39, they found 20,499 more HS.…”
Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features. Among them, we can mention that Tor can hide a user’s IP address when accessing to a service such as the Web, and it also supports Tor hidden services (THS) (now named onion services) as a mechanism to conceal the server’s IP address, used mainly to provide anonymity to websites. THS is an important research field in Tor. However, there is a lack of reviews that sum up the main findings and research challenges. In this article, we present a systematic literature review that aims to offer a comprehensive overview of the research made on THS by presenting the state-of-the-art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and presents main findings and advances regarding Tor hidden services, limitations found, and future issues to be investigated.
Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many websites. In this paper, we present a novel method to automatically monitor trends and find anomalies on the internet. The system was tested on Twitter data. The results showed that it can successfully recognize abnormal changes in activity or emotion.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.