Disciplines
Information Security | Software Engineering | Systems Architecture
Abstract (300 words maximum)
The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this essay takes a dive into the skeleton of what constructs the dark web by compiling the research of published essays. TOR and other discussed browsers are specialized web browsers that provide anonymity by going through multiple servers and encrypted networks between the host and client, hiding the IP address of both ends. This provides difficulty in terms of controlling or monitoring the dark web, leading to its popularity in criminal underworlds.
In this work, we provide an overview of data mining and penetration testing tools that are being widely used to crawl and collect data. We compare the tools to provide strength and weaknesses of the tools while providing challenges of harnessing massive data from dark web using crawlers and penetration testing tools. Despite the effort to crawl dark web has progressed there are still rooms to advance existing approaches to combat the ever-changing landscape of the dark web.
Academic department under which the project should be listed
CCSE - Information Technology
Primary Investigator (PI) Name
Hossain Shahriar
Included in
Information Security Commons, Software Engineering Commons, Systems Architecture Commons
A Review of Dark Web: Crawling and Discovery of Information
The dark web is often discussed in taboo by many who are unfamiliar with the subject. However, this essay takes a dive into the skeleton of what constructs the dark web by compiling the research of published essays. TOR and other discussed browsers are specialized web browsers that provide anonymity by going through multiple servers and encrypted networks between the host and client, hiding the IP address of both ends. This provides difficulty in terms of controlling or monitoring the dark web, leading to its popularity in criminal underworlds.
In this work, we provide an overview of data mining and penetration testing tools that are being widely used to crawl and collect data. We compare the tools to provide strength and weaknesses of the tools while providing challenges of harnessing massive data from dark web using crawlers and penetration testing tools. Despite the effort to crawl dark web has progressed there are still rooms to advance existing approaches to combat the ever-changing landscape of the dark web.