Users may browse the internet anonymously thanks to the Tor network. The open source software permits anonymous usage of online browsers, instant messaging, and other applications.
Published in Chapter:
Cognitive Systems for Dark Web Cyber Delinquent Association Malignant Data Crawling: A Review
Romil Rawat (Computer and Communication Technology Department, University of Extremadura, Spain), Vinod Mahor (Computer and Communication Technology Department, University of Extremadura, Spain), Josefa Díaz Álvarez (University of Extremadura, Spain & Centro Universitario de M´erida, Spain), and Francisco Ch´avez (University of Extremadura, Spain & Centro Universitario de M´erida, Spain)
Copyright: © 2023
|Pages: 19
DOI: 10.4018/978-1-6684-6741-1.ch003
Abstract
The limits of user visibility have been exceeded by the internet. The “dark web” or “dark net” refers to certain unknown portions of the web that cannot be found using standard search methods. A number of automated techniques are being explored to extract for crawling the concealed data. All users can freely interact on the surface web. Account credentials may be found on the dark web (DW), a hub for anonymized data, is a haven for terrorists and cybercriminals to promote their message and engage in illegal commerce. Officials in covert security and cyberpolicing are always trying to track down delinquent chains or hints. To find DW delinquents, the exercise may take 6–12 years. The suggested effort gives specialists an outline for building the automated engine for crawling all hazardous information from associated sources as well as data from DW crawling and shadow economy area scenarios.