Dark Web Traffic Analysis of Cybersecurity Threats Through South African Internet Protocol Address Space

Cybersecurity crimes masterminded at dark web pose social security threats global and open a conundrum for researchers in the field of security informatics. Dark web describes a layer beneath deep web on Internet protocol stack that is designed to be concealed from orthodox search engines. The concealment of orthodox search engines has made it extremely hard for law enforcement agencies to track specific websites that pose great cybersecurity threats. This research was supported financially by the BankSeta, Council on Scientific and Industrial Research and National Research Foundation of South Africa to track the malicious use of dark web through South African Internet protocol address space. The study applies the method of dark web crawling using onion router to track traffic with high tendency for cybersecurity threats. The results of crawling experimental indicate that child pornography, sales of spyware, hacking, sales of drugs, planning of violence and sales of dangerous weapons are the frequent malicious use of dark web in South Africa. The outcome of this study can help in creating an accurate revelation of cybersecurity threats to assist law enforcement agencies to combat cybercriminals in the country.

[1]  I Gede Surya Rahayuda,et al.  Crawling and cluster hidden web using crawler framework and fuzzy-KNN , 2017, 2017 5th International Conference on Cyber and IT Service Management (CITSM).

[2]  Gabriel Weimann,et al.  Going Dark: Terrorism on the Dark Web , 2016 .

[3]  Darren R. Hayes,et al.  A Framework for More Effective Dark Web Marketplace Investigations , 2018, Inf..

[4]  Bill Cheswick,et al.  Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.

[5]  Ian Goldberg,et al.  Enhancing Tor's performance using real-time traffic classification , 2012, CCS.

[6]  Ian Goldberg,et al.  An improved algorithm for tor circuit scheduling , 2010, CCS '10.

[7]  Richard Frank,et al.  Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation , 2017, Sexual abuse : a journal of research and treatment.

[8]  Hsinchun Chen Dark Web: Exploring and Data Mining the Dark Side of the Web , 2011 .

[9]  Lisha Singh,et al.  A dive into Web Scraper world , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[10]  Vitaly Shmatikov,et al.  The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.

[11]  Martin C. Libicki,et al.  Markets for Cybercrime Tools and Stolen Data , 2014 .

[12]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[13]  Richard Frank,et al.  Surfacing collaborated networks in dark web to find illicit and criminal content , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[14]  Margaret E. Roberts,et al.  How Censorship in China Allows Government Criticism but Silences Collective Expression , 2013, American Political Science Review.

[15]  Derek Doran,et al.  A Broad Evaluation of the Tor English Content Ecosystem , 2019, WebSci.

[16]  Guido Wirtz,et al.  Performance Measurements and Statistics of Tor Hidden Services , 2008, 2008 International Symposium on Applications and the Internet.

[17]  Diana S. Dolliver,et al.  A rejoinder to authors: Data collection on Tor. , 2015, The International journal on drug policy.

[18]  Mohamed Ali Kâafar,et al.  Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.

[19]  M. Brooks Who controls the internet , 2009 .

[20]  Yong Zhang,et al.  Traffic Identification of Tor and Web-Mix , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[21]  Donald I. Barker,et al.  Internet Research-Illustrated , 2002 .

[22]  Sin Wee Lee,et al.  Mining the Dark Web: Drugs and Fake Ids , 2016, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW).

[23]  Nicolas Christin,et al.  Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.

[24]  Xuan Zhang,et al.  A Framework for Dark Web Threat Intelligence Analysis , 2018, Int. J. Digit. Crime Forensics.

[25]  Yannis Stavrakas,et al.  ARCOMEM Crawling Architecture , 2014, Future Internet.

[26]  Stefan Lindskog,et al.  How the Great Firewall of China is Blocking Tor , 2012, FOCI.

[27]  Dirk Grunwald,et al.  Low-resource routing attacks against tor , 2007, WPES '07.

[28]  Amir Herzberg,et al.  Spying in the Dark: TCP and Tor Traffic Analysis , 2012, Privacy Enhancing Technologies.

[29]  George Danezis,et al.  Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[30]  Micah Adler,et al.  An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.

[31]  Andrew M. Kahonge,et al.  Social Media Forensics For Hate Speech Opinion Mining , 2016 .

[32]  Tobby Simon,et al.  The Impact of the Dark Web on Internet Governance and Cyber Security , 2015 .

[33]  A. Roxburgh,et al.  A response to Dolliver's "Evaluating drug trafficking on the Tor network". , 2015, The International journal on drug policy.