Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
skip to main content
10.1145/3133956.3138849acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: Probing Tor Hidden Service with Dockers

Published: 30 October 2017 Publication History
  • Get Citation Alerts
  • Abstract

    Tor is a commonly used anonymous network that provides the hidden services. As the number of hidden services using Tor's anonymous network has been steadily increasing every year, so does the number of services that abuse Tor's anonymity. The existing research on the Tor is mainly focused on Tor's security loopholes and anonymity. As a result, how to collect and analyze the contents of Tor's hidden services is not yet in full swing. In addition, due to the slow access speed of the Tor browser, it is difficult to observe the dynamics of the hidden services. In this work, we present a tool that can monitor the status of hidden services for the analysis of authentic hidden service contents, and have automated our tool with the virtualization software, Docker, to improve the crawling performance. From August 12, 2017 to August 20, 2017, we collected a total of 9,176 sites and analyzed contents for 100 pages.

    References

    [1]
    Andres Baravalle, Mauro Sanchez Lopez, and Sin Wee Lee. 2016. Mining the Dark Web: Drugs and Fake Ids. In Data Mining Workshops (ICDMW), 2016 IEEE 16th International Conference on. IEEE, 350--356.
    [2]
    Alex Biryukov, Ivan Pustogarov, Fabrice Thill, and Ralf-Philipp Weinmann. 2014. Content and popularity analysis of Tor hidden services. In Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on. IEEE, 188--193.
    [3]
    Kang Li, Peipeng Liu, Qingfeng Tan, Jinqiao Shi, Yue Gao, and Xuebin Wang. 2016. Out-of-band discovery and evaluation for tor hidden services. In Proceedings of the 31st Annual ACM Symposium on Applied Computing. ACM, 2057--2062.
    [4]
    Zhen Ling, Junzhou Luo, Kui Wu, and Xinwen Fu. 2013. Protocol-level hidden server discovery. In INFOCOM, 2013 Proceedings IEEE. IEEE, 1043--1051.
    [5]
    Dirk Merkel. 2014. Docker: lightweight linux containers for consistent development and deployment. Linux Journal 2014, 239 (2014), 2.
    [6]
    Iskander Sanchez-Rola, Davide Balzarotti, and Igor Santos. 2017. The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1251--1260.
    [7]
    Matthew Thomas and Aziz Mohaisen. 2014. Measuring the Leakage of Onion at the Root. ACM WPES (2014).
    [8]
    Ahmed T Zulkarnine, Richard Frank, Bryan Monk, Julianna Mitchell, and Garth Davies. 2016. Surfacing collaborated networks in dark web to fnd illicit and criminal content. In Intelligence and Security Informatics (ISI), 2016 IEEE Conference on. IEEE, 109--114.

    Cited By

    View all
    • (2023)On the gathering of Tor onion addressesFuture Generation Computer Systems10.1016/j.future.2023.02.024145:C(12-26)Online publication date: 1-Aug-2023
    • (2018)Improving Tor Hidden Service Crawler Performance2018 IEEE Conference on Dependable and Secure Computing (DSC)10.1109/DESEC.2018.8625103(1-8)Online publication date: Dec-2018

    Index Terms

    1. POSTER: Probing Tor Hidden Service with Dockers

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
      October 2017
      2682 pages
      ISBN:9781450349468
      DOI:10.1145/3133956
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2017

      Check for updates

      Author Tags

      1. dark web
      2. deep web
      3. docker
      4. hidden service
      5. tor

      Qualifiers

      • Poster

      Funding Sources

      • ITRC(Information Technology Research Center)

      Conference

      CCS '17
      Sponsor:

      Acceptance Rates

      CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)1

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)On the gathering of Tor onion addressesFuture Generation Computer Systems10.1016/j.future.2023.02.024145:C(12-26)Online publication date: 1-Aug-2023
      • (2018)Improving Tor Hidden Service Crawler Performance2018 IEEE Conference on Dependable and Secure Computing (DSC)10.1109/DESEC.2018.8625103(1-8)Online publication date: Dec-2018

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media