Abstract
AbstractThe Tor network is known for its opaque characteristics and involvement in illicit activities, motivating to shed light on the exposure, lifetime, and functionalities of onion services. This study focuses on the appearance of Tor links in online advertising and monitors the connectivity status and protocols of the collected onion domains through the Tor network over 105 days. Out of 54,602 onion addresses gathered, it was found that 38% of Tor links were advertised only once, 43% between two and five times, and 19% more than five times. Furthermore, 50% of the addresses were exclusively advertised on the surface web, 6% on the dark web, and 44% on both portions. The temporal analysis revealed that 67% of the addresses were predominantly active, 7% were intermittent, and 26% were mostly inactive. The study examined fifteen protocols used by onion services, concluding that 94% employed a single protocol, while 6% utilized between two and eight protocols. Among active sites, HTTP was present in 99.75% of cases, followed by SSH (4.95%) and HTTPS (0.64%). Additionally, onion services without web services often deploy cryptocurrency or instant messaging servers. This study offers a comprehensive and current understanding of the dark web, surpassing previous research in its scope.
Funder
Ministerio de Educación y Formación Profesional
Ministerio de Universidades
Universidad de Murcia
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Project, T. The tor project privacy & freedom online. Retrieved 04 July 2023 from https://www.torproject.org/.
2. Pastor-Galindo, J., Mármol, F. G., & Pérez, G. M. (2021). Nothing to hide? On the security and privacy threats beyond open data. IEEE Internet Computing, 25(4), 58–66.
3. Manual, T. Onion services. Retrieved 04 July 2023 from https://tb-manual.torproject.org/onion-services/.
4. Pastor-Galindo, J., Mármol, F. G., & Pérez, G. M. (2023). On the gathering of tor onion addresses. Future Generation Computer Systems, 145, 12–26. https://doi.org/10.1016/j.future.2023.02.024
5. Ruiz Ródenas, J. M., Pastor-Galindo, J., & Gómez Mármol, F. (2023). A general and modular framework for dark web analysis. Cluster Computing, 1–17.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献