Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study
The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through sp...
Saved in:
Published in | Journal of information security and applications Vol. 68; p. 103229 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.08.2022
|
Subjects | |
Online Access | Get full text |
ISSN | 2214-2126 |
DOI | 10.1016/j.jisa.2022.103229 |
Cover
Abstract | The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through specific methods and techniques. The latter is deployed in the so-called darknets, which have been the subject of much less study, where anonymity and privacy security services are preserved. Although there are several darknets, Tor is the most well-known and widely analyzed. Hence, the current work presents an analysis of web site connectivity, relationships and content of one of the less known and explored darknets: Freenet. Given the special features of this study, a new crawling tool, called c4darknet, was developed for the purpose of this work. This tool is, in turn, used in the experimentation that was carried out in a real distributed environment. Our results can be summarized as follows: there is great general availability of websites on Freenet; there are significant nodes within the network connectivity structure; and underage porn or child pornography is predominant among illegal content. Finally, the outcomes are compared against a similar study for the I2P darknet, showing special features and differences between both darknets.
•Analysis of web site connectivity, relationships and content of the Freenet darknet.•This is the first work addressing how freesites are related and inter-connected.•A new crawling tool to explore and analyze web sites connectivity and contents.•Freesites are highly reachable and inter-connected, making groups by content topics.•Outcomes are discussed and compared against a similar study for the I2P darknet. |
---|---|
AbstractList | The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through specific methods and techniques. The latter is deployed in the so-called darknets, which have been the subject of much less study, where anonymity and privacy security services are preserved. Although there are several darknets, Tor is the most well-known and widely analyzed. Hence, the current work presents an analysis of web site connectivity, relationships and content of one of the less known and explored darknets: Freenet. Given the special features of this study, a new crawling tool, called c4darknet, was developed for the purpose of this work. This tool is, in turn, used in the experimentation that was carried out in a real distributed environment. Our results can be summarized as follows: there is great general availability of websites on Freenet; there are significant nodes within the network connectivity structure; and underage porn or child pornography is predominant among illegal content. Finally, the outcomes are compared against a similar study for the I2P darknet, showing special features and differences between both darknets.
•Analysis of web site connectivity, relationships and content of the Freenet darknet.•This is the first work addressing how freesites are related and inter-connected.•A new crawling tool to explore and analyze web sites connectivity and contents.•Freesites are highly reachable and inter-connected, making groups by content topics.•Outcomes are discussed and compared against a similar study for the I2P darknet. |
ArticleNumber | 103229 |
Author | Boubeta-Puig, Juan Magán-Carrión, Roberto Figueras-Martín, Emilio |
Author_xml | – sequence: 1 givenname: Emilio orcidid: 0000-0003-1603-1189 surname: Figueras-Martín fullname: Figueras-Martín, Emilio email: emilio.figuerasmartin@alum.uca.es organization: School of Engineering, University of Cádiz, Avda. de la Universidad de Cádiz 10, 11519 Puerto Real, Cádiz, Spain – sequence: 2 givenname: Roberto orcidid: 0000-0002-7744-7308 surname: Magán-Carrión fullname: Magán-Carrión, Roberto email: rmagan@ugr.es organization: NESG (Network Engineering & Security Group), Department of Signal Theory, Telematics and Communication - CITIC, University of Granada, Spain – sequence: 3 givenname: Juan orcidid: 0000-0002-8989-7509 surname: Boubeta-Puig fullname: Boubeta-Puig, Juan email: juan.boubeta@uca.es organization: UCASE Software Engineering Research Group, Department of Computer Science and Engineering, University of Cádiz, Avda. de la Universidad de Cádiz 10, 11519 Puerto Real, Cádiz, Spain |
BookMark | eNp9kL1OAzEQhF0EiRDyAlR-gQv2-n4RDQoEkCLRpLd89h74CD5kO0T39vgUKopUOxrtN9LMFZm5wSEhN5ytOOPlbb_qbVArYADJEADNjMwBeJ4Bh_KSLEPoGWMceFOAmBP16NXRuncaP5AesaUh-oOOB49UOUP14CK6mLTaj8EG2uI4JH_63g2eGuU_HcY7uvGISVAVqKJaBaRDl7IOZrwmF53aB1z-3QXZbZ5265ds-_b8un7YZlrkecwqwBoFqJo1ZcFEW5qyKFRn2hq4qExVa4ZFo0STN9B0BWNtV5eC6VbnVc5rsSD1KVb7IQSPndQ2qmhTAa_sXnImp4FkL6eB5DSQPA2UUPiHfnv7pfx4Hro_QZg6_Vj0MmiLTqOxHnWUZrDn8F_Yr4LJ |
CitedBy_id | crossref_primary_10_1038_s41598_024_58346_7 crossref_primary_10_23919_ICN_2024_0022 crossref_primary_10_1109_ACCESS_2023_3268027 |
Cites_doi | 10.1016/j.diin.2019.05.004 10.1080/00396338.2016.1142085 10.1109/INFCOM.2013.6566846 10.1145/1653662.1653709 10.1016/j.forsciint.2017.05.021 10.1145/3038912.3052657 10.1016/j.eswa.2019.01.029 10.1049/iet-ifs.2015.0121 10.1186/s13635-017-0064-5 10.1016/j.diin.2018.09.005 10.1186/s13174-016-0044-x 10.1016/j.comnet.2021.108158 10.1109/SRDSW.2011.19 10.1109/COMST.2015.2453434 10.1109/TAEECE.2013.6557206 10.1109/LANMAN.2019.8847113 10.1109/EISIC.2012.25 10.1137/1.9781611972863.14 10.1109/ACSAC.2007.7 10.1109/4236.978368 |
ContentType | Journal Article |
Copyright | 2022 The Author(s) |
Copyright_xml | – notice: 2022 The Author(s) |
DBID | 6I. AAFTH AAYXX CITATION |
DOI | 10.1016/j.jisa.2022.103229 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | 10_1016_j_jisa_2022_103229 S2214212622001016 |
GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 6I. 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c344t-72e8e32a8096503b6d655afdb82137d78c0e59a394929f500bf8630cbc474183 |
IEDL.DBID | .~1 |
ISSN | 2214-2126 |
IngestDate | Tue Jul 01 02:49:49 EDT 2025 Thu Apr 24 23:00:59 EDT 2025 Fri Feb 23 02:39:53 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Deep Web Darknet Connectivity Freenet Content analysis |
Language | English |
License | This is an open access article under the CC BY license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c344t-72e8e32a8096503b6d655afdb82137d78c0e59a394929f500bf8630cbc474183 |
ORCID | 0000-0002-7744-7308 0000-0003-1603-1189 0000-0002-8989-7509 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S2214212622001016 |
ParticipantIDs | crossref_citationtrail_10_1016_j_jisa_2022_103229 crossref_primary_10_1016_j_jisa_2022_103229 elsevier_sciencedirect_doi_10_1016_j_jisa_2022_103229 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | August 2022 2022-08-00 |
PublicationDateYYYYMMDD | 2022-08-01 |
PublicationDate_xml | – month: 08 year: 2022 text: August 2022 |
PublicationDecade | 2020 |
PublicationTitle | Journal of information security and applications |
PublicationYear | 2022 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Georgoulias, Pedersen, Falch, Vasilomanolakis (b35) 2021 Sánchez-Rola I, Balzarotti D, Santos I. The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. In: Proceedings of the 26th International Conference on World Wide Web. 2017. Cramer C, Kutzner K, Fuhrmann T. Bootstrapping locality-aware P2P networks. In: Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), vol. 1. 2004, p. 357–61 vol.1. Soro F, Drago I, Trevisan M, Mellia M, Ceron J, Santanna JJ. Are Darknets All The Same? On Darknet Visibility for Security Monitoring. In: 2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). 2019, p. 1–6. Faizan, Khan, Agrawal (b39) 2020 Hoang, Kintis, Antonakakis, Polychronakis (b4) 2018 Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). 2007, p. 305–14. Winder (b5) 2020 Owen, Savage (b8) 2016; 10 (b1) 2020 Rashed, Piorkowski, McCulloh (b6) 2019 Cohen, Mirsky, Elovici, Puzis, Kamp, Martin, Shabtai (b31) 2020 Roos, Schiller, Hacker, Strufe (b26) 2014 Sochor T. Fuzzy control of configuration of web anonymization using TOR. In: 2013 the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE). 2013, p. 115–20. Iliou, Kalpakis, Tsikrika, Vrochidis, Kompatsiaris (b10) 2017; 2017 (b16) 2021 Broséus, Rhumorbarbe, Morelato, Staehli, Rossy (b9) 2017; 277 (b15) 2017 Tian, Duan, Baumeister, Dong (b24) 2017; 14 Magán-Carrión, Abellán-Galera, Maciá-Fernández, a Teodoro (b13) 2021; 194 Sandberg O. Distributed Routing in Small-World Networks. In: ALENEX. 2006. (b38) 2019 Moore, Rid (b32) 2016; 58 Gao, Tan, Shi, Wang, Chen (b29) 2017 Nabki, Fidalgo, Alegre, González-Castro (b33) 2017; 1 Fidalgo, Alegre, Fernández-Robles, ctor González-Castro (b7) 2019; 30 Al Nabki, Fidalgo, Alegre, de Paz (b34) 2017 Al-Nabki, Fidalgo, Alegre, Fernández-Robles (b2) 2019; 123 Petit, Cerqueus, Boutet, Mokhtar, Coquil, Brunie, Kosch (b28) 2016; 7 Schiller B, Roos S, Hofer A, Strufe T. Attack Resistant Network Embeddings for Darknets. In: 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops. 2011, p. 90–5. Owenson, Cortes, Lewman (b36) 2018; 27 Westlake B, Bouchard M, Frank R. Comparing Methods for Detecting Child Exploitation Content Online. In: 2012 European Intelligence and Security Informatics Conference. 2012, p. 156–63. Roos S, Strufe T. A contribution to analyzing and enhancing Darknet routing. In: 2013 Proceedings IEEE INFOCOM. 2013, p. 615–9. (b17) 2021 Clarke, Miller, Hong, Sandberg, Wiley (b18) 2002; 6 Kalpakis, Tsikrika, Cunningham, Iliou, Vrochidis, Middleton, Kompatsiaris (b3) 2016 Vasserman E, Jansen R, Tyra J, Hopper N, Kim Y. Membership-concealing overlay networks. In: ACM Conference on Computer and Communications Security. 2009. Erdin, Zachor, Gunes (b27) 2015; 17 Avarikioti, Brunner, Kiayias, Wattenhofer, Zindros (b12) 2018 (b37) 2020 Nabki (10.1016/j.jisa.2022.103229_b33) 2017; 1 Faizan (10.1016/j.jisa.2022.103229_b39) 2020 Erdin (10.1016/j.jisa.2022.103229_b27) 2015; 17 Gao (10.1016/j.jisa.2022.103229_b29) 2017 10.1016/j.jisa.2022.103229_b40 10.1016/j.jisa.2022.103229_b20 Moore (10.1016/j.jisa.2022.103229_b32) 2016; 58 (10.1016/j.jisa.2022.103229_b16) 2021 10.1016/j.jisa.2022.103229_b21 10.1016/j.jisa.2022.103229_b22 10.1016/j.jisa.2022.103229_b23 (10.1016/j.jisa.2022.103229_b15) 2017 10.1016/j.jisa.2022.103229_b25 Al Nabki (10.1016/j.jisa.2022.103229_b34) 2017 Winder (10.1016/j.jisa.2022.103229_b5) 2020 Georgoulias (10.1016/j.jisa.2022.103229_b35) 2021 (10.1016/j.jisa.2022.103229_b37) 2020 Rashed (10.1016/j.jisa.2022.103229_b6) 2019 Fidalgo (10.1016/j.jisa.2022.103229_b7) 2019; 30 (10.1016/j.jisa.2022.103229_b17) 2021 Magán-Carrión (10.1016/j.jisa.2022.103229_b13) 2021; 194 Tian (10.1016/j.jisa.2022.103229_b24) 2017; 14 Iliou (10.1016/j.jisa.2022.103229_b10) 2017; 2017 (10.1016/j.jisa.2022.103229_b1) 2020 10.1016/j.jisa.2022.103229_b30 Avarikioti (10.1016/j.jisa.2022.103229_b12) 2018 10.1016/j.jisa.2022.103229_b11 Clarke (10.1016/j.jisa.2022.103229_b18) 2002; 6 Roos (10.1016/j.jisa.2022.103229_b26) 2014 Hoang (10.1016/j.jisa.2022.103229_b4) 2018 10.1016/j.jisa.2022.103229_b14 Owenson (10.1016/j.jisa.2022.103229_b36) 2018; 27 (10.1016/j.jisa.2022.103229_b38) 2019 Kalpakis (10.1016/j.jisa.2022.103229_b3) 2016 10.1016/j.jisa.2022.103229_b19 Owen (10.1016/j.jisa.2022.103229_b8) 2016; 10 Al-Nabki (10.1016/j.jisa.2022.103229_b2) 2019; 123 Broséus (10.1016/j.jisa.2022.103229_b9) 2017; 277 Cohen (10.1016/j.jisa.2022.103229_b31) 2020 Petit (10.1016/j.jisa.2022.103229_b28) 2016; 7 |
References_xml | – reference: Vasserman E, Jansen R, Tyra J, Hopper N, Kim Y. Membership-concealing overlay networks. In: ACM Conference on Computer and Communications Security. 2009. – volume: 2017 start-page: 11 year: 2017 ident: b10 article-title: Hybrid focused crawling on the Surface and the Dark Web publication-title: EURASIP J. Inf. Secur. – volume: 17 start-page: 2296 year: 2015 end-page: 2316 ident: b27 article-title: How to find hidden users: A survey of attacks on anonymity networks publication-title: IEEE Commun Surv Tutor – volume: 27 start-page: 17 year: 2018 end-page: 22 ident: b36 article-title: The darknet’s smaller than we thought: The life cycle of Tor Hidden Services publication-title: Digit. Invest. – year: 2020 ident: b1 article-title: WEB: Cisco Annual Internet Report (2018–2023) White Paper – year: 2020 ident: b5 article-title: Hacker gives away 386 million stolen records on dark web-what you need to do now publication-title: Forbes – reference: Sandberg O. Distributed Routing in Small-World Networks. In: ALENEX. 2006. – start-page: 35 year: 2017 end-page: 43 ident: b34 article-title: Classifying illegal activities on tor network based on web textual contents publication-title: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers – year: 2021 ident: b16 article-title: WEB: PUppeteer – reference: Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). 2007, p. 305–14. – start-page: 444 year: 2017 end-page: 449 ident: b29 article-title: Large-scale discovery and empirical analysis for I2P eepSites publication-title: 2017 IEEE Symposium on Computers and Communications (ISCC) – year: 2021 ident: b35 article-title: COVID-19 vaccination certificates in the Darkweb – volume: 6 start-page: 40 year: 2002 end-page: 49 ident: b18 article-title: Protecting free expression online with Freenet publication-title: IEEE Internet Comput – volume: 277 start-page: 88 year: 2017 end-page: 102 ident: b9 article-title: A geographical analysis of trafficking on a popular darknet market publication-title: Forensic Sci. Int. – year: 2020 ident: b37 article-title: WEB: FReenet – year: 2018 ident: b12 article-title: Structure and content of the visible darknet – volume: 123 start-page: 212 year: 2019 end-page: 226 ident: b2 article-title: TORank: Identifying the most influential suspicious domains in the Tor network publication-title: Expert Syst Appl – start-page: 899 year: 2019 end-page: 902 ident: b6 article-title: Evaluation of extremist cohesion in a darknet forum using ERGM and LDA publication-title: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) – volume: 7 start-page: 2 year: 2016 ident: b28 article-title: SimAttack: Private web search under fire publication-title: J. Internet Serv. Appl. – reference: Sánchez-Rola I, Balzarotti D, Santos I. The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. In: Proceedings of the 26th International Conference on World Wide Web. 2017. – volume: 58 start-page: 7 year: 2016 end-page: 38 ident: b32 article-title: Cryptopolitik and the darknet publication-title: Survival – volume: 1 start-page: 24 year: 2017 end-page: 30 ident: b33 article-title: Detecting emerging products in TOR network based on K-shell graph decomposition publication-title: Actas de Las Terceras Jornadas Nacionales de Investigación En Ciberseguridad – reference: Westlake B, Bouchard M, Frank R. Comparing Methods for Detecting Child Exploitation Content Online. In: 2012 European Intelligence and Security Informatics Conference. 2012, p. 156–63. – volume: 14 start-page: 294 year: 2017 end-page: 307 ident: b24 article-title: A traceback attack on freenet publication-title: IEEE Trans Dependable Secure Comput – year: 2017 ident: b15 article-title: WEB: CRawling dark web sites on the TOR network – start-page: 263 year: 2014 end-page: 282 ident: b26 article-title: Measuring freenet in the wild: Censorship-resilience under observation publication-title: Privacy Enhancing Technologies – year: 2020 ident: b31 article-title: DANTE: A framework for mining and monitoring darknet traffic – year: 2020 ident: b39 article-title: Ranking potentially harmful tor hidden services: Illicit drugs perspective publication-title: Appl. Comput. Inf. – volume: 10 start-page: 113 year: 2016 end-page: 118 ident: b8 article-title: Empirical analysis of Tor Hidden Services publication-title: IET Inf Secur – reference: Schiller B, Roos S, Hofer A, Strufe T. Attack Resistant Network Embeddings for Darknets. In: 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops. 2011, p. 90–5. – reference: Roos S, Strufe T. A contribution to analyzing and enhancing Darknet routing. In: 2013 Proceedings IEEE INFOCOM. 2013, p. 615–9. – year: 2018 ident: b4 article-title: An empirical study of the I2P anonymity network and its censorship resistance publication-title: Proceedings of the Internet Measurement Conference 2018 – volume: 30 start-page: 12 year: 2019 end-page: 22 ident: b7 article-title: Classifying suspicious content in tor darknet through semantic attention keypoint filtering publication-title: Digit. Investig. – reference: Sochor T. Fuzzy control of configuration of web anonymization using TOR. In: 2013 the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE). 2013, p. 115–20. – start-page: 111 year: 2016 end-page: 132 ident: b3 article-title: OSINT and the dark web publication-title: Open Source Intelligence Investigation: from Strategy To Implementation – reference: Soro F, Drago I, Trevisan M, Mellia M, Ceron J, Santanna JJ. Are Darknets All The Same? On Darknet Visibility for Security Monitoring. In: 2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). 2019, p. 1–6. – volume: 194 year: 2021 ident: b13 article-title: Unveiling the I2P web structure: A connectivity analysis publication-title: Comput Netw – reference: Cramer C, Kutzner K, Fuhrmann T. Bootstrapping locality-aware P2P networks. In: Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), vol. 1. 2004, p. 357–61 vol.1. – year: 2021 ident: b17 article-title: WEB: ParseHub – year: 2019 ident: b38 article-title: WEB: Freenet RegEx – volume: 30 start-page: 12 year: 2019 ident: 10.1016/j.jisa.2022.103229_b7 article-title: Classifying suspicious content in tor darknet through semantic attention keypoint filtering publication-title: Digit. Investig. doi: 10.1016/j.diin.2019.05.004 – volume: 58 start-page: 7 issue: 1 year: 2016 ident: 10.1016/j.jisa.2022.103229_b32 article-title: Cryptopolitik and the darknet publication-title: Survival doi: 10.1080/00396338.2016.1142085 – start-page: 263 year: 2014 ident: 10.1016/j.jisa.2022.103229_b26 article-title: Measuring freenet in the wild: Censorship-resilience under observation – year: 2021 ident: 10.1016/j.jisa.2022.103229_b35 – start-page: 111 year: 2016 ident: 10.1016/j.jisa.2022.103229_b3 article-title: OSINT and the dark web – year: 2021 ident: 10.1016/j.jisa.2022.103229_b17 – ident: 10.1016/j.jisa.2022.103229_b21 doi: 10.1109/INFCOM.2013.6566846 – volume: 14 start-page: 294 issue: 3 year: 2017 ident: 10.1016/j.jisa.2022.103229_b24 article-title: A traceback attack on freenet publication-title: IEEE Trans Dependable Secure Comput – ident: 10.1016/j.jisa.2022.103229_b14 doi: 10.1145/1653662.1653709 – volume: 277 start-page: 88 year: 2017 ident: 10.1016/j.jisa.2022.103229_b9 article-title: A geographical analysis of trafficking on a popular darknet market publication-title: Forensic Sci. Int. doi: 10.1016/j.forsciint.2017.05.021 – ident: 10.1016/j.jisa.2022.103229_b11 doi: 10.1145/3038912.3052657 – volume: 123 start-page: 212 year: 2019 ident: 10.1016/j.jisa.2022.103229_b2 article-title: TORank: Identifying the most influential suspicious domains in the Tor network publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2019.01.029 – volume: 10 start-page: 113 issue: 3 year: 2016 ident: 10.1016/j.jisa.2022.103229_b8 article-title: Empirical analysis of Tor Hidden Services publication-title: IET Inf Secur doi: 10.1049/iet-ifs.2015.0121 – start-page: 899 year: 2019 ident: 10.1016/j.jisa.2022.103229_b6 article-title: Evaluation of extremist cohesion in a darknet forum using ERGM and LDA – volume: 2017 start-page: 11 issue: 1 year: 2017 ident: 10.1016/j.jisa.2022.103229_b10 article-title: Hybrid focused crawling on the Surface and the Dark Web publication-title: EURASIP J. Inf. Secur. doi: 10.1186/s13635-017-0064-5 – volume: 27 start-page: 17 year: 2018 ident: 10.1016/j.jisa.2022.103229_b36 article-title: The darknet’s smaller than we thought: The life cycle of Tor Hidden Services publication-title: Digit. Invest. doi: 10.1016/j.diin.2018.09.005 – year: 2018 ident: 10.1016/j.jisa.2022.103229_b4 article-title: An empirical study of the I2P anonymity network and its censorship resistance – year: 2018 ident: 10.1016/j.jisa.2022.103229_b12 – volume: 7 start-page: 2 year: 2016 ident: 10.1016/j.jisa.2022.103229_b28 article-title: SimAttack: Private web search under fire publication-title: J. Internet Serv. Appl. doi: 10.1186/s13174-016-0044-x – year: 2019 ident: 10.1016/j.jisa.2022.103229_b38 – year: 2020 ident: 10.1016/j.jisa.2022.103229_b5 article-title: Hacker gives away 386 million stolen records on dark web-what you need to do now publication-title: Forbes – volume: 194 year: 2021 ident: 10.1016/j.jisa.2022.103229_b13 article-title: Unveiling the I2P web structure: A connectivity analysis publication-title: Comput Netw doi: 10.1016/j.comnet.2021.108158 – year: 2020 ident: 10.1016/j.jisa.2022.103229_b37 – year: 2020 ident: 10.1016/j.jisa.2022.103229_b31 – ident: 10.1016/j.jisa.2022.103229_b19 – start-page: 444 year: 2017 ident: 10.1016/j.jisa.2022.103229_b29 article-title: Large-scale discovery and empirical analysis for I2P eepSites – ident: 10.1016/j.jisa.2022.103229_b23 doi: 10.1109/SRDSW.2011.19 – year: 2017 ident: 10.1016/j.jisa.2022.103229_b15 – volume: 17 start-page: 2296 issue: 4 year: 2015 ident: 10.1016/j.jisa.2022.103229_b27 article-title: How to find hidden users: A survey of attacks on anonymity networks publication-title: IEEE Commun Surv Tutor doi: 10.1109/COMST.2015.2453434 – start-page: 35 year: 2017 ident: 10.1016/j.jisa.2022.103229_b34 article-title: Classifying illegal activities on tor network based on web textual contents – ident: 10.1016/j.jisa.2022.103229_b25 doi: 10.1109/TAEECE.2013.6557206 – ident: 10.1016/j.jisa.2022.103229_b30 doi: 10.1109/LANMAN.2019.8847113 – year: 2021 ident: 10.1016/j.jisa.2022.103229_b16 – volume: 1 start-page: 24 year: 2017 ident: 10.1016/j.jisa.2022.103229_b33 article-title: Detecting emerging products in TOR network based on K-shell graph decomposition publication-title: Actas de Las Terceras Jornadas Nacionales de Investigación En Ciberseguridad – year: 2020 ident: 10.1016/j.jisa.2022.103229_b39 article-title: Ranking potentially harmful tor hidden services: Illicit drugs perspective publication-title: Appl. Comput. Inf. – ident: 10.1016/j.jisa.2022.103229_b40 doi: 10.1109/EISIC.2012.25 – year: 2020 ident: 10.1016/j.jisa.2022.103229_b1 – ident: 10.1016/j.jisa.2022.103229_b20 doi: 10.1137/1.9781611972863.14 – ident: 10.1016/j.jisa.2022.103229_b22 doi: 10.1109/ACSAC.2007.7 – volume: 6 start-page: 40 issue: 1 year: 2002 ident: 10.1016/j.jisa.2022.103229_b18 article-title: Protecting free expression online with Freenet publication-title: IEEE Internet Comput doi: 10.1109/4236.978368 |
SSID | ssj0001219523 |
Score | 2.310999 |
Snippet | The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 103229 |
SubjectTerms | Connectivity Content analysis Darknet Deep Web Freenet |
Title | Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study |
URI | https://dx.doi.org/10.1016/j.jisa.2022.103229 |
Volume | 68 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) issn: 2214-2126 databaseCode: GBLVA dateStart: 20110101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection (subscription) issn: 2214-2126 databaseCode: ACRLP dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection 2013 issn: 2214-2126 databaseCode: .~1 dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals issn: 2214-2126 databaseCode: AIKHN dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals issn: 2214-2126 databaseCode: AKRWK dateStart: 20130701 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001219523 providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRpRH5YENhcaO4yZsVaEqILpQpG6RHTtSC0qrUsTGb-cudlCRUAe2xLpTorNzd3a--46QSwtRx8ahDhiXBjYoJg1SU_BAqzTlTCOBCZ5DPo3k8EU8TOJJg_TrWhiEVXrf73x65a39SMdbs7OYTjvPHNnC4BGcO6I0rGAXEmF9119s7ZyFpXHV5Q3lA1TwtTMO5jXDf8YcIhmWn_Mq0_wjPq3FnMEe2fHJIu2599knDVsekN26EQP13-UhUbdL9QkxiEI2R8EvUscK-7G0VJWGIhwdYgtcOwISqquylUp6PF9So5avpV3d0AGCcCwIvlNFc4hvdF7QioD2iIwHd-P-MPC9E4I8EmIVdLlNbMRVguwuYaSlkXGsCqMTzqKu6SZ5aONURamA_KiIw1AXiYzCXOcC-WyiY9Is56U9IbTAQQnbslAWApIJJTVsckyimImsYKxFWG2wLPe84tje4i2rAWSzDI2coZEzZ-QWufrRWThWjY3ScT0P2a-1kYHb36B3-k-9M7KNdw7md06aMGX2AlKPlW5Xa6tNtnr3j8PRN0db1cI |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLbGdoALb8SbHLiham3adC23CZg2HrswpN2qpEmlDdShMcTfx25SNCS0A7cqtdXKSf05qf0Z4NIg6hjhKy_gscYNik69VBfcUzJNeaCIwITOIZ-Gcf8luh-LcQNu6loYSqt0vt_69Mpbu5G2s2b7fTJpP3NiC8NHcG6J0tagFQn0yU1odQcP_eHSUUuQiqrRG6l4pOPKZ2ym15R-G3MEM6pA51Ww-QdELcFObxs2XbzIuvaVdqBhyl3YqnsxMPdp7oG8ncsvhCGGAR1D18gsMezn3DBZakYZ6QgveG05SJiqKlcq6dFszrScv5Zmcc16lIdjUPCDSZYjxLFZwSoO2n0Y9e5GN33PtU_w8jCKFl6Hm8SEXCZE8OKHKtaxELLQKuFB2NGdJPeNSGWYRhgiFcL3VZHEoZ-rPCJKm_AAmuWsNIfAChqMcWfmx0WE8YSMFe5zdCIDHZooCI4gqA2W5Y5anDpcvGV1Dtk0IyNnZOTMGvkIrn503i2xxkppUc9D9mt5ZOj5V-gd_1PvAtb7o6fH7HEwfDiBDbpjs_5OoYnTZ84wElmoc7fSvgGfEtht |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Drawing+the+web+structure+and+content+analysis+beyond+the+Tor+darknet%3A+Freenet+as+a+case+of+study&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Figueras-Mart%C3%ADn%2C+Emilio&rft.au=Mag%C3%A1n-Carri%C3%B3n%2C+Roberto&rft.au=Boubeta-Puig%2C+Juan&rft.date=2022-08-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=68&rft_id=info:doi/10.1016%2Fj.jisa.2022.103229&rft.externalDocID=S2214212622001016 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |