Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study

The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through sp...

Full description

Saved in:
Bibliographic Details
Published inJournal of information security and applications Vol. 68; p. 103229
Main Authors Figueras-Martín, Emilio, Magán-Carrión, Roberto, Boubeta-Puig, Juan
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.08.2022
Subjects
Online AccessGet full text
ISSN2214-2126
DOI10.1016/j.jisa.2022.103229

Cover

Abstract The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through specific methods and techniques. The latter is deployed in the so-called darknets, which have been the subject of much less study, where anonymity and privacy security services are preserved. Although there are several darknets, Tor is the most well-known and widely analyzed. Hence, the current work presents an analysis of web site connectivity, relationships and content of one of the less known and explored darknets: Freenet. Given the special features of this study, a new crawling tool, called c4darknet, was developed for the purpose of this work. This tool is, in turn, used in the experimentation that was carried out in a real distributed environment. Our results can be summarized as follows: there is great general availability of websites on Freenet; there are significant nodes within the network connectivity structure; and underage porn or child pornography is predominant among illegal content. Finally, the outcomes are compared against a similar study for the I2P darknet, showing special features and differences between both darknets. •Analysis of web site connectivity, relationships and content of the Freenet darknet.•This is the first work addressing how freesites are related and inter-connected.•A new crawling tool to explore and analyze web sites connectivity and contents.•Freesites are highly reachable and inter-connected, making groups by content topics.•Outcomes are discussed and compared against a similar study for the I2P darknet.
AbstractList The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through specific methods and techniques. The latter is deployed in the so-called darknets, which have been the subject of much less study, where anonymity and privacy security services are preserved. Although there are several darknets, Tor is the most well-known and widely analyzed. Hence, the current work presents an analysis of web site connectivity, relationships and content of one of the less known and explored darknets: Freenet. Given the special features of this study, a new crawling tool, called c4darknet, was developed for the purpose of this work. This tool is, in turn, used in the experimentation that was carried out in a real distributed environment. Our results can be summarized as follows: there is great general availability of websites on Freenet; there are significant nodes within the network connectivity structure; and underage porn or child pornography is predominant among illegal content. Finally, the outcomes are compared against a similar study for the I2P darknet, showing special features and differences between both darknets. •Analysis of web site connectivity, relationships and content of the Freenet darknet.•This is the first work addressing how freesites are related and inter-connected.•A new crawling tool to explore and analyze web sites connectivity and contents.•Freesites are highly reachable and inter-connected, making groups by content topics.•Outcomes are discussed and compared against a similar study for the I2P darknet.
ArticleNumber 103229
Author Boubeta-Puig, Juan
Magán-Carrión, Roberto
Figueras-Martín, Emilio
Author_xml – sequence: 1
  givenname: Emilio
  orcidid: 0000-0003-1603-1189
  surname: Figueras-Martín
  fullname: Figueras-Martín, Emilio
  email: emilio.figuerasmartin@alum.uca.es
  organization: School of Engineering, University of Cádiz, Avda. de la Universidad de Cádiz 10, 11519 Puerto Real, Cádiz, Spain
– sequence: 2
  givenname: Roberto
  orcidid: 0000-0002-7744-7308
  surname: Magán-Carrión
  fullname: Magán-Carrión, Roberto
  email: rmagan@ugr.es
  organization: NESG (Network Engineering & Security Group), Department of Signal Theory, Telematics and Communication - CITIC, University of Granada, Spain
– sequence: 3
  givenname: Juan
  orcidid: 0000-0002-8989-7509
  surname: Boubeta-Puig
  fullname: Boubeta-Puig, Juan
  email: juan.boubeta@uca.es
  organization: UCASE Software Engineering Research Group, Department of Computer Science and Engineering, University of Cádiz, Avda. de la Universidad de Cádiz 10, 11519 Puerto Real, Cádiz, Spain
BookMark eNp9kL1OAzEQhF0EiRDyAlR-gQv2-n4RDQoEkCLRpLd89h74CD5kO0T39vgUKopUOxrtN9LMFZm5wSEhN5ytOOPlbb_qbVArYADJEADNjMwBeJ4Bh_KSLEPoGWMceFOAmBP16NXRuncaP5AesaUh-oOOB49UOUP14CK6mLTaj8EG2uI4JH_63g2eGuU_HcY7uvGISVAVqKJaBaRDl7IOZrwmF53aB1z-3QXZbZ5265ds-_b8un7YZlrkecwqwBoFqJo1ZcFEW5qyKFRn2hq4qExVa4ZFo0STN9B0BWNtV5eC6VbnVc5rsSD1KVb7IQSPndQ2qmhTAa_sXnImp4FkL6eB5DSQPA2UUPiHfnv7pfx4Hro_QZg6_Vj0MmiLTqOxHnWUZrDn8F_Yr4LJ
CitedBy_id crossref_primary_10_1038_s41598_024_58346_7
crossref_primary_10_23919_ICN_2024_0022
crossref_primary_10_1109_ACCESS_2023_3268027
Cites_doi 10.1016/j.diin.2019.05.004
10.1080/00396338.2016.1142085
10.1109/INFCOM.2013.6566846
10.1145/1653662.1653709
10.1016/j.forsciint.2017.05.021
10.1145/3038912.3052657
10.1016/j.eswa.2019.01.029
10.1049/iet-ifs.2015.0121
10.1186/s13635-017-0064-5
10.1016/j.diin.2018.09.005
10.1186/s13174-016-0044-x
10.1016/j.comnet.2021.108158
10.1109/SRDSW.2011.19
10.1109/COMST.2015.2453434
10.1109/TAEECE.2013.6557206
10.1109/LANMAN.2019.8847113
10.1109/EISIC.2012.25
10.1137/1.9781611972863.14
10.1109/ACSAC.2007.7
10.1109/4236.978368
ContentType Journal Article
Copyright 2022 The Author(s)
Copyright_xml – notice: 2022 The Author(s)
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.jisa.2022.103229
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jisa_2022_103229
S2214212622001016
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
6I.
7-5
8P~
AACTN
AAEDT
AAEDW
AAFJI
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
RIG
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c344t-72e8e32a8096503b6d655afdb82137d78c0e59a394929f500bf8630cbc474183
IEDL.DBID .~1
ISSN 2214-2126
IngestDate Tue Jul 01 02:49:49 EDT 2025
Thu Apr 24 23:00:59 EDT 2025
Fri Feb 23 02:39:53 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Deep Web
Darknet
Connectivity
Freenet
Content analysis
Language English
License This is an open access article under the CC BY license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c344t-72e8e32a8096503b6d655afdb82137d78c0e59a394929f500bf8630cbc474183
ORCID 0000-0002-7744-7308
0000-0003-1603-1189
0000-0002-8989-7509
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S2214212622001016
ParticipantIDs crossref_citationtrail_10_1016_j_jisa_2022_103229
crossref_primary_10_1016_j_jisa_2022_103229
elsevier_sciencedirect_doi_10_1016_j_jisa_2022_103229
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate August 2022
2022-08-00
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: August 2022
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2022
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Georgoulias, Pedersen, Falch, Vasilomanolakis (b35) 2021
Sánchez-Rola I, Balzarotti D, Santos I. The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. In: Proceedings of the 26th International Conference on World Wide Web. 2017.
Cramer C, Kutzner K, Fuhrmann T. Bootstrapping locality-aware P2P networks. In: Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), vol. 1. 2004, p. 357–61 vol.1.
Soro F, Drago I, Trevisan M, Mellia M, Ceron J, Santanna JJ. Are Darknets All The Same? On Darknet Visibility for Security Monitoring. In: 2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). 2019, p. 1–6.
Faizan, Khan, Agrawal (b39) 2020
Hoang, Kintis, Antonakakis, Polychronakis (b4) 2018
Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). 2007, p. 305–14.
Winder (b5) 2020
Owen, Savage (b8) 2016; 10
(b1) 2020
Rashed, Piorkowski, McCulloh (b6) 2019
Cohen, Mirsky, Elovici, Puzis, Kamp, Martin, Shabtai (b31) 2020
Roos, Schiller, Hacker, Strufe (b26) 2014
Sochor T. Fuzzy control of configuration of web anonymization using TOR. In: 2013 the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE). 2013, p. 115–20.
Iliou, Kalpakis, Tsikrika, Vrochidis, Kompatsiaris (b10) 2017; 2017
(b16) 2021
Broséus, Rhumorbarbe, Morelato, Staehli, Rossy (b9) 2017; 277
(b15) 2017
Tian, Duan, Baumeister, Dong (b24) 2017; 14
Magán-Carrión, Abellán-Galera, Maciá-Fernández, a Teodoro (b13) 2021; 194
Sandberg O. Distributed Routing in Small-World Networks. In: ALENEX. 2006.
(b38) 2019
Moore, Rid (b32) 2016; 58
Gao, Tan, Shi, Wang, Chen (b29) 2017
Nabki, Fidalgo, Alegre, González-Castro (b33) 2017; 1
Fidalgo, Alegre, Fernández-Robles, ctor González-Castro (b7) 2019; 30
Al Nabki, Fidalgo, Alegre, de Paz (b34) 2017
Al-Nabki, Fidalgo, Alegre, Fernández-Robles (b2) 2019; 123
Petit, Cerqueus, Boutet, Mokhtar, Coquil, Brunie, Kosch (b28) 2016; 7
Schiller B, Roos S, Hofer A, Strufe T. Attack Resistant Network Embeddings for Darknets. In: 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops. 2011, p. 90–5.
Owenson, Cortes, Lewman (b36) 2018; 27
Westlake B, Bouchard M, Frank R. Comparing Methods for Detecting Child Exploitation Content Online. In: 2012 European Intelligence and Security Informatics Conference. 2012, p. 156–63.
Roos S, Strufe T. A contribution to analyzing and enhancing Darknet routing. In: 2013 Proceedings IEEE INFOCOM. 2013, p. 615–9.
(b17) 2021
Clarke, Miller, Hong, Sandberg, Wiley (b18) 2002; 6
Kalpakis, Tsikrika, Cunningham, Iliou, Vrochidis, Middleton, Kompatsiaris (b3) 2016
Vasserman E, Jansen R, Tyra J, Hopper N, Kim Y. Membership-concealing overlay networks. In: ACM Conference on Computer and Communications Security. 2009.
Erdin, Zachor, Gunes (b27) 2015; 17
Avarikioti, Brunner, Kiayias, Wattenhofer, Zindros (b12) 2018
(b37) 2020
Nabki (10.1016/j.jisa.2022.103229_b33) 2017; 1
Faizan (10.1016/j.jisa.2022.103229_b39) 2020
Erdin (10.1016/j.jisa.2022.103229_b27) 2015; 17
Gao (10.1016/j.jisa.2022.103229_b29) 2017
10.1016/j.jisa.2022.103229_b40
10.1016/j.jisa.2022.103229_b20
Moore (10.1016/j.jisa.2022.103229_b32) 2016; 58
(10.1016/j.jisa.2022.103229_b16) 2021
10.1016/j.jisa.2022.103229_b21
10.1016/j.jisa.2022.103229_b22
10.1016/j.jisa.2022.103229_b23
(10.1016/j.jisa.2022.103229_b15) 2017
10.1016/j.jisa.2022.103229_b25
Al Nabki (10.1016/j.jisa.2022.103229_b34) 2017
Winder (10.1016/j.jisa.2022.103229_b5) 2020
Georgoulias (10.1016/j.jisa.2022.103229_b35) 2021
(10.1016/j.jisa.2022.103229_b37) 2020
Rashed (10.1016/j.jisa.2022.103229_b6) 2019
Fidalgo (10.1016/j.jisa.2022.103229_b7) 2019; 30
(10.1016/j.jisa.2022.103229_b17) 2021
Magán-Carrión (10.1016/j.jisa.2022.103229_b13) 2021; 194
Tian (10.1016/j.jisa.2022.103229_b24) 2017; 14
Iliou (10.1016/j.jisa.2022.103229_b10) 2017; 2017
(10.1016/j.jisa.2022.103229_b1) 2020
10.1016/j.jisa.2022.103229_b30
Avarikioti (10.1016/j.jisa.2022.103229_b12) 2018
10.1016/j.jisa.2022.103229_b11
Clarke (10.1016/j.jisa.2022.103229_b18) 2002; 6
Roos (10.1016/j.jisa.2022.103229_b26) 2014
Hoang (10.1016/j.jisa.2022.103229_b4) 2018
10.1016/j.jisa.2022.103229_b14
Owenson (10.1016/j.jisa.2022.103229_b36) 2018; 27
(10.1016/j.jisa.2022.103229_b38) 2019
Kalpakis (10.1016/j.jisa.2022.103229_b3) 2016
10.1016/j.jisa.2022.103229_b19
Owen (10.1016/j.jisa.2022.103229_b8) 2016; 10
Al-Nabki (10.1016/j.jisa.2022.103229_b2) 2019; 123
Broséus (10.1016/j.jisa.2022.103229_b9) 2017; 277
Cohen (10.1016/j.jisa.2022.103229_b31) 2020
Petit (10.1016/j.jisa.2022.103229_b28) 2016; 7
References_xml – reference: Vasserman E, Jansen R, Tyra J, Hopper N, Kim Y. Membership-concealing overlay networks. In: ACM Conference on Computer and Communications Security. 2009.
– volume: 2017
  start-page: 11
  year: 2017
  ident: b10
  article-title: Hybrid focused crawling on the Surface and the Dark Web
  publication-title: EURASIP J. Inf. Secur.
– volume: 17
  start-page: 2296
  year: 2015
  end-page: 2316
  ident: b27
  article-title: How to find hidden users: A survey of attacks on anonymity networks
  publication-title: IEEE Commun Surv Tutor
– volume: 27
  start-page: 17
  year: 2018
  end-page: 22
  ident: b36
  article-title: The darknet’s smaller than we thought: The life cycle of Tor Hidden Services
  publication-title: Digit. Invest.
– year: 2020
  ident: b1
  article-title: WEB: Cisco Annual Internet Report (2018–2023) White Paper
– year: 2020
  ident: b5
  article-title: Hacker gives away 386 million stolen records on dark web-what you need to do now
  publication-title: Forbes
– reference: Sandberg O. Distributed Routing in Small-World Networks. In: ALENEX. 2006.
– start-page: 35
  year: 2017
  end-page: 43
  ident: b34
  article-title: Classifying illegal activities on tor network based on web textual contents
  publication-title: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers
– year: 2021
  ident: b16
  article-title: WEB: PUppeteer
– reference: Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007). 2007, p. 305–14.
– start-page: 444
  year: 2017
  end-page: 449
  ident: b29
  article-title: Large-scale discovery and empirical analysis for I2P eepSites
  publication-title: 2017 IEEE Symposium on Computers and Communications (ISCC)
– year: 2021
  ident: b35
  article-title: COVID-19 vaccination certificates in the Darkweb
– volume: 6
  start-page: 40
  year: 2002
  end-page: 49
  ident: b18
  article-title: Protecting free expression online with Freenet
  publication-title: IEEE Internet Comput
– volume: 277
  start-page: 88
  year: 2017
  end-page: 102
  ident: b9
  article-title: A geographical analysis of trafficking on a popular darknet market
  publication-title: Forensic Sci. Int.
– year: 2020
  ident: b37
  article-title: WEB: FReenet
– year: 2018
  ident: b12
  article-title: Structure and content of the visible darknet
– volume: 123
  start-page: 212
  year: 2019
  end-page: 226
  ident: b2
  article-title: TORank: Identifying the most influential suspicious domains in the Tor network
  publication-title: Expert Syst Appl
– start-page: 899
  year: 2019
  end-page: 902
  ident: b6
  article-title: Evaluation of extremist cohesion in a darknet forum using ERGM and LDA
  publication-title: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
– volume: 7
  start-page: 2
  year: 2016
  ident: b28
  article-title: SimAttack: Private web search under fire
  publication-title: J. Internet Serv. Appl.
– reference: Sánchez-Rola I, Balzarotti D, Santos I. The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. In: Proceedings of the 26th International Conference on World Wide Web. 2017.
– volume: 58
  start-page: 7
  year: 2016
  end-page: 38
  ident: b32
  article-title: Cryptopolitik and the darknet
  publication-title: Survival
– volume: 1
  start-page: 24
  year: 2017
  end-page: 30
  ident: b33
  article-title: Detecting emerging products in TOR network based on K-shell graph decomposition
  publication-title: Actas de Las Terceras Jornadas Nacionales de Investigación En Ciberseguridad
– reference: Westlake B, Bouchard M, Frank R. Comparing Methods for Detecting Child Exploitation Content Online. In: 2012 European Intelligence and Security Informatics Conference. 2012, p. 156–63.
– volume: 14
  start-page: 294
  year: 2017
  end-page: 307
  ident: b24
  article-title: A traceback attack on freenet
  publication-title: IEEE Trans Dependable Secure Comput
– year: 2017
  ident: b15
  article-title: WEB: CRawling dark web sites on the TOR network
– start-page: 263
  year: 2014
  end-page: 282
  ident: b26
  article-title: Measuring freenet in the wild: Censorship-resilience under observation
  publication-title: Privacy Enhancing Technologies
– year: 2020
  ident: b31
  article-title: DANTE: A framework for mining and monitoring darknet traffic
– year: 2020
  ident: b39
  article-title: Ranking potentially harmful tor hidden services: Illicit drugs perspective
  publication-title: Appl. Comput. Inf.
– volume: 10
  start-page: 113
  year: 2016
  end-page: 118
  ident: b8
  article-title: Empirical analysis of Tor Hidden Services
  publication-title: IET Inf Secur
– reference: Schiller B, Roos S, Hofer A, Strufe T. Attack Resistant Network Embeddings for Darknets. In: 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops. 2011, p. 90–5.
– reference: Roos S, Strufe T. A contribution to analyzing and enhancing Darknet routing. In: 2013 Proceedings IEEE INFOCOM. 2013, p. 615–9.
– year: 2018
  ident: b4
  article-title: An empirical study of the I2P anonymity network and its censorship resistance
  publication-title: Proceedings of the Internet Measurement Conference 2018
– volume: 30
  start-page: 12
  year: 2019
  end-page: 22
  ident: b7
  article-title: Classifying suspicious content in tor darknet through semantic attention keypoint filtering
  publication-title: Digit. Investig.
– reference: Sochor T. Fuzzy control of configuration of web anonymization using TOR. In: 2013 the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE). 2013, p. 115–20.
– start-page: 111
  year: 2016
  end-page: 132
  ident: b3
  article-title: OSINT and the dark web
  publication-title: Open Source Intelligence Investigation: from Strategy To Implementation
– reference: Soro F, Drago I, Trevisan M, Mellia M, Ceron J, Santanna JJ. Are Darknets All The Same? On Darknet Visibility for Security Monitoring. In: 2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). 2019, p. 1–6.
– volume: 194
  year: 2021
  ident: b13
  article-title: Unveiling the I2P web structure: A connectivity analysis
  publication-title: Comput Netw
– reference: Cramer C, Kutzner K, Fuhrmann T. Bootstrapping locality-aware P2P networks. In: Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955), vol. 1. 2004, p. 357–61 vol.1.
– year: 2021
  ident: b17
  article-title: WEB: ParseHub
– year: 2019
  ident: b38
  article-title: WEB: Freenet RegEx
– volume: 30
  start-page: 12
  year: 2019
  ident: 10.1016/j.jisa.2022.103229_b7
  article-title: Classifying suspicious content in tor darknet through semantic attention keypoint filtering
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2019.05.004
– volume: 58
  start-page: 7
  issue: 1
  year: 2016
  ident: 10.1016/j.jisa.2022.103229_b32
  article-title: Cryptopolitik and the darknet
  publication-title: Survival
  doi: 10.1080/00396338.2016.1142085
– start-page: 263
  year: 2014
  ident: 10.1016/j.jisa.2022.103229_b26
  article-title: Measuring freenet in the wild: Censorship-resilience under observation
– year: 2021
  ident: 10.1016/j.jisa.2022.103229_b35
– start-page: 111
  year: 2016
  ident: 10.1016/j.jisa.2022.103229_b3
  article-title: OSINT and the dark web
– year: 2021
  ident: 10.1016/j.jisa.2022.103229_b17
– ident: 10.1016/j.jisa.2022.103229_b21
  doi: 10.1109/INFCOM.2013.6566846
– volume: 14
  start-page: 294
  issue: 3
  year: 2017
  ident: 10.1016/j.jisa.2022.103229_b24
  article-title: A traceback attack on freenet
  publication-title: IEEE Trans Dependable Secure Comput
– ident: 10.1016/j.jisa.2022.103229_b14
  doi: 10.1145/1653662.1653709
– volume: 277
  start-page: 88
  year: 2017
  ident: 10.1016/j.jisa.2022.103229_b9
  article-title: A geographical analysis of trafficking on a popular darknet market
  publication-title: Forensic Sci. Int.
  doi: 10.1016/j.forsciint.2017.05.021
– ident: 10.1016/j.jisa.2022.103229_b11
  doi: 10.1145/3038912.3052657
– volume: 123
  start-page: 212
  year: 2019
  ident: 10.1016/j.jisa.2022.103229_b2
  article-title: TORank: Identifying the most influential suspicious domains in the Tor network
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.01.029
– volume: 10
  start-page: 113
  issue: 3
  year: 2016
  ident: 10.1016/j.jisa.2022.103229_b8
  article-title: Empirical analysis of Tor Hidden Services
  publication-title: IET Inf Secur
  doi: 10.1049/iet-ifs.2015.0121
– start-page: 899
  year: 2019
  ident: 10.1016/j.jisa.2022.103229_b6
  article-title: Evaluation of extremist cohesion in a darknet forum using ERGM and LDA
– volume: 2017
  start-page: 11
  issue: 1
  year: 2017
  ident: 10.1016/j.jisa.2022.103229_b10
  article-title: Hybrid focused crawling on the Surface and the Dark Web
  publication-title: EURASIP J. Inf. Secur.
  doi: 10.1186/s13635-017-0064-5
– volume: 27
  start-page: 17
  year: 2018
  ident: 10.1016/j.jisa.2022.103229_b36
  article-title: The darknet’s smaller than we thought: The life cycle of Tor Hidden Services
  publication-title: Digit. Invest.
  doi: 10.1016/j.diin.2018.09.005
– year: 2018
  ident: 10.1016/j.jisa.2022.103229_b4
  article-title: An empirical study of the I2P anonymity network and its censorship resistance
– year: 2018
  ident: 10.1016/j.jisa.2022.103229_b12
– volume: 7
  start-page: 2
  year: 2016
  ident: 10.1016/j.jisa.2022.103229_b28
  article-title: SimAttack: Private web search under fire
  publication-title: J. Internet Serv. Appl.
  doi: 10.1186/s13174-016-0044-x
– year: 2019
  ident: 10.1016/j.jisa.2022.103229_b38
– year: 2020
  ident: 10.1016/j.jisa.2022.103229_b5
  article-title: Hacker gives away 386 million stolen records on dark web-what you need to do now
  publication-title: Forbes
– volume: 194
  year: 2021
  ident: 10.1016/j.jisa.2022.103229_b13
  article-title: Unveiling the I2P web structure: A connectivity analysis
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2021.108158
– year: 2020
  ident: 10.1016/j.jisa.2022.103229_b37
– year: 2020
  ident: 10.1016/j.jisa.2022.103229_b31
– ident: 10.1016/j.jisa.2022.103229_b19
– start-page: 444
  year: 2017
  ident: 10.1016/j.jisa.2022.103229_b29
  article-title: Large-scale discovery and empirical analysis for I2P eepSites
– ident: 10.1016/j.jisa.2022.103229_b23
  doi: 10.1109/SRDSW.2011.19
– year: 2017
  ident: 10.1016/j.jisa.2022.103229_b15
– volume: 17
  start-page: 2296
  issue: 4
  year: 2015
  ident: 10.1016/j.jisa.2022.103229_b27
  article-title: How to find hidden users: A survey of attacks on anonymity networks
  publication-title: IEEE Commun Surv Tutor
  doi: 10.1109/COMST.2015.2453434
– start-page: 35
  year: 2017
  ident: 10.1016/j.jisa.2022.103229_b34
  article-title: Classifying illegal activities on tor network based on web textual contents
– ident: 10.1016/j.jisa.2022.103229_b25
  doi: 10.1109/TAEECE.2013.6557206
– ident: 10.1016/j.jisa.2022.103229_b30
  doi: 10.1109/LANMAN.2019.8847113
– year: 2021
  ident: 10.1016/j.jisa.2022.103229_b16
– volume: 1
  start-page: 24
  year: 2017
  ident: 10.1016/j.jisa.2022.103229_b33
  article-title: Detecting emerging products in TOR network based on K-shell graph decomposition
  publication-title: Actas de Las Terceras Jornadas Nacionales de Investigación En Ciberseguridad
– year: 2020
  ident: 10.1016/j.jisa.2022.103229_b39
  article-title: Ranking potentially harmful tor hidden services: Illicit drugs perspective
  publication-title: Appl. Comput. Inf.
– ident: 10.1016/j.jisa.2022.103229_b40
  doi: 10.1109/EISIC.2012.25
– year: 2020
  ident: 10.1016/j.jisa.2022.103229_b1
– ident: 10.1016/j.jisa.2022.103229_b20
  doi: 10.1137/1.9781611972863.14
– ident: 10.1016/j.jisa.2022.103229_b22
  doi: 10.1109/ACSAC.2007.7
– volume: 6
  start-page: 40
  issue: 1
  year: 2002
  ident: 10.1016/j.jisa.2022.103229_b18
  article-title: Protecting free expression online with Freenet
  publication-title: IEEE Internet Comput
  doi: 10.1109/4236.978368
SSID ssj0001219523
Score 2.310999
Snippet The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible. The rest of...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 103229
SubjectTerms Connectivity
Content analysis
Darknet
Deep Web
Freenet
Title Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study
URI https://dx.doi.org/10.1016/j.jisa.2022.103229
Volume 68
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 2214-2126
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection (subscription)
  issn: 2214-2126
  databaseCode: ACRLP
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection 2013
  issn: 2214-2126
  databaseCode: .~1
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  issn: 2214-2126
  databaseCode: AIKHN
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 2214-2126
  databaseCode: AKRWK
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRpRH5YENhcaO4yZsVaEqILpQpG6RHTtSC0qrUsTGb-cudlCRUAe2xLpTorNzd3a--46QSwtRx8ahDhiXBjYoJg1SU_BAqzTlTCOBCZ5DPo3k8EU8TOJJg_TrWhiEVXrf73x65a39SMdbs7OYTjvPHNnC4BGcO6I0rGAXEmF9119s7ZyFpXHV5Q3lA1TwtTMO5jXDf8YcIhmWn_Mq0_wjPq3FnMEe2fHJIu2599knDVsekN26EQP13-UhUbdL9QkxiEI2R8EvUscK-7G0VJWGIhwdYgtcOwISqquylUp6PF9So5avpV3d0AGCcCwIvlNFc4hvdF7QioD2iIwHd-P-MPC9E4I8EmIVdLlNbMRVguwuYaSlkXGsCqMTzqKu6SZ5aONURamA_KiIw1AXiYzCXOcC-WyiY9Is56U9IbTAQQnbslAWApIJJTVsckyimImsYKxFWG2wLPe84tje4i2rAWSzDI2coZEzZ-QWufrRWThWjY3ScT0P2a-1kYHb36B3-k-9M7KNdw7md06aMGX2AlKPlW5Xa6tNtnr3j8PRN0db1cI
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLbGdoALb8SbHLiham3adC23CZg2HrswpN2qpEmlDdShMcTfx25SNCS0A7cqtdXKSf05qf0Z4NIg6hjhKy_gscYNik69VBfcUzJNeaCIwITOIZ-Gcf8luh-LcQNu6loYSqt0vt_69Mpbu5G2s2b7fTJpP3NiC8NHcG6J0tagFQn0yU1odQcP_eHSUUuQiqrRG6l4pOPKZ2ym15R-G3MEM6pA51Ww-QdELcFObxs2XbzIuvaVdqBhyl3YqnsxMPdp7oG8ncsvhCGGAR1D18gsMezn3DBZakYZ6QgveG05SJiqKlcq6dFszrScv5Zmcc16lIdjUPCDSZYjxLFZwSoO2n0Y9e5GN33PtU_w8jCKFl6Hm8SEXCZE8OKHKtaxELLQKuFB2NGdJPeNSGWYRhgiFcL3VZHEoZ-rPCJKm_AAmuWsNIfAChqMcWfmx0WE8YSMFe5zdCIDHZooCI4gqA2W5Y5anDpcvGV1Dtk0IyNnZOTMGvkIrn503i2xxkppUc9D9mt5ZOj5V-gd_1PvAtb7o6fH7HEwfDiBDbpjs_5OoYnTZ84wElmoc7fSvgGfEtht
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Drawing+the+web+structure+and+content+analysis+beyond+the+Tor+darknet%3A+Freenet+as+a+case+of+study&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Figueras-Mart%C3%ADn%2C+Emilio&rft.au=Mag%C3%A1n-Carri%C3%B3n%2C+Roberto&rft.au=Boubeta-Puig%2C+Juan&rft.date=2022-08-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=68&rft_id=info:doi/10.1016%2Fj.jisa.2022.103229&rft.externalDocID=S2214212622001016
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon