Cognitive Systems for Dark Web Cyber Delinquent Association Malignant Data Crawling: A Review

Cognitive Systems for Dark Web Cyber Delinquent Association Malignant Data Crawling: A Review

Romil Rawat, Vinod Mahor, Josefa Díaz Álvarez, Francisco Ch´avez
Copyright: © 2023 |Pages: 19
DOI: 10.4018/978-1-6684-6741-1.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The limits of user visibility have been exceeded by the internet. The “dark web” or “dark net” refers to certain unknown portions of the web that cannot be found using standard search methods. A number of automated techniques are being explored to extract for crawling the concealed data. All users can freely interact on the surface web. Account credentials may be found on the dark web (DW), a hub for anonymized data, is a haven for terrorists and cybercriminals to promote their message and engage in illegal commerce. Officials in covert security and cyberpolicing are always trying to track down delinquent chains or hints. To find DW delinquents, the exercise may take 6–12 years. The suggested effort gives specialists an outline for building the automated engine for crawling all hazardous information from associated sources as well as data from DW crawling and shadow economy area scenarios.
Chapter Preview
Top

1. Introduction

A black shadow economy (Gupta, Maynard, & Ahmad, 2021)(Weimann, 2016)(Tsuchiya & Hiramoto, 2021) (Squires, 2021)(SO¨ NMEZ & Codal, 2022) is a DW commercial site that uses darknet (DN) like Tor or I2P (Gupta et al., 2021)(Weimann, 2016). They generally serve as black marketplaces(MPS), selling or brokering transactions involving narcotics (Rawat, Mahor, Rawat, Garg, & Telang, 2021), cyber-arms, guns, counterfeit currencies, stolen credit card information, falsified papers, unlicensed medications, steroids, and other illicit commodities, as well as illegitimate goods. According to a survey by (Squires, 2021) (Sonmez & Codal, 2022) from the University of Portsmouth, DN shadow economy were the second most popular Tor sites.

The DW’s unregulated and anonymous nature appeals to a variety of malevolent entities, including terrorist organisations and hackers (Gupta et al., 2021). The DW allows for anonymous communication, including recruiting (Weimann, 2016), Terrorist groups may promote their ideas, recruit, exchange expertise, train, shadow economy, fundraise, target, and build communities without regard for geography or even the presence of a local leader (Sonmez & Codal, 2022).

Similarly, the DW (Wang, Zhang, & Hong, 2021) enables for anonymous information sharing amongst hackers. Since DW forums are frequently been the subject of many types of surveillance, ranging from manual observation to crawling mixed with natural language processing(NLP) (Rawat et al., 2021) techniques for automated threat intelligence. Terrorism or cybercrime (Gupta et al., 2021) Individuals or well-organized organisations can carry out (Weimann, 2016)(Tsuchiya & Hiramoto, 2021) on the DW. Cybercrime is becoming more accessible to anybody who wants to engage in low-risk illegal activities while yet making a difference (for example, launching DDoS (Alshammery & Aljuboori, 2022) assaults on sites is as simple as contracting a botnet that provides (DDoS-as-a-Assistance)). These assistances allow a delinquent to take advantage of the targets with no security controls. Tor’s hidden assistance can let attackers and victims maintain command-and-control (C2) (Gupta et al., 2021)(Weimann, 2016) (Sonmez & Codal, 2022) communications.

Tor’s anonymity (and difficulties in shutting it down) is excellent for C2 servers, and it is one of the most widely utilized hidden assistance.

Key Terms in this Chapter

Dark Web: The dark web is the material of the Web that can only be accessed with certain software, setups, or authorizations. Darknets are overlay nets that utilise the Internet.

Cyber Terrorist: Cyberterrorism is the use of the Internet to carry out violent activities that cause or threaten serious physical injury or the loss of life in order to advance politically or intellectual goals through harassment or threat.

Tor Network: Users may browse the internet anonymously thanks to the Tor network. The open source software permits anonymous usage of online browsers, instant messaging, and other applications.

Web Crawler: A Web crawler is a Web bot who routinely navigates the World Wide Web and is invariably run by search engines for the purpose of Web indexing. It is also known as a spider, spiderbot, or just a crawler.

Shadow Economy: Transactions of products or services not disclosed to the government and consequently out of the reach of tax collectors and regulators are referred to as the “underground economy,” sometimes known as the “shadow economy.”

Complete Chapter List

Search this Book:
Reset