A Framework for Dark Web Threat Intelligence Analysis

A Framework for Dark Web Threat Intelligence Analysis

Xuan Zhang, KP Chow
Copyright: © 2018 |Pages: 10
DOI: 10.4018/IJDCF.2018100108
(Individual Articles)
No Current Special Offers


This article describes how the Dark Web is usually considered the dark side of the World Wide Web. Cyber criminals usually use specialized tools, e.g. TOR, to access the hidden services inside the Dark Web anonymously. Law enforcement officers have difficulty tracing the identity of these cyber criminals using traditional network investigation techniques that are based on IP addresses. The information available in the Dark Web, which includes BitCoin wallets, email addresses, hyperlinks, images and user behavior profiles, can be used for further analysis, such as a correlation analysis. Present within this artcile is a threat intelligence analysis framework to help analyze the crimes and criminals in the Dark Web and the framework is realized by the implementation of the Dark Web Threat Intelligence Analysis (DWTIA) Platform.
Article Preview

The Dark Web

To access the Dark Web, specialized tools are needed, such as TOR (The Onion Router), I2P and Freenet. All these tools support anonymous web serving. The most popular one is TOR. The principle behind TOR is communication between a user and the server will go through many routers and all communications are encrypted. Moreover, communication between any 2 routers uses different encryption key. Therefore, no one is able to trace where the real user and the server are. In this manner, anonymous web serving can be guaranteed.

Complete Article List

Search this Journal:
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing