Home » Articles

Articles

Stochastic.PNG

Research: Using stochastic geometry to analyze network traffic and exclude heterogeneous (malicious) darknet traffic

Throughout the past few years, the explosive advancement of receivers and the rapid surge of data traffic have greatly impacted the current network architecture. According to data presented by the Cisco Complete VNI in 2017, the monthly internet traffic per receiver will rise to around 43 GB by the year 2021. As such, in order to attain optimum network management ... Read More »

onion o.jpg

Research: Analyzing the Tor routing protocol to identify structural weaknesses

The Onion Router (Tor) has been developed in order to protect the privacy, integrity, and availability of communications taking place across its network. This unique network is based on a community that utilizes a special network protocol to enable users to browse the internet anonymously. Even though the protocol’s open source code is publically available, some of its aspects, including ... Read More »

SGX-Tor.PNG

SGX-Tor: Maximizing Tor’s anonymity via SGX enclaves

With the growing popularity of Tor as an anonymity network, a large number of attacks have emerged to undermine its anonymity. Guaranteeing total anonymity despite adversaries targeting Tor represents an extremely difficult task, especially since Tor relay nodes are hosted by volunteers located all over the globe. Presently, one can obtain sensitive information, such as identifiers of hidden services and ... Read More »

Identification of darknet hacker communities (forums, IRCs, carding shops, and darknet marketplaces)

Cyber attacks lead to global losses that exceed $450 billion each year. To address this problem, ethical hackers and researchers put great efforts into Cyber Threat Intelligence (CTI) development in order to identify hackers and emerging threats. CTI analysts have highlighted the significance of studying the ever-growing online hacker communities. Despite their valuable CTI importance, collection of data from online ... Read More »

Tactical_Cyber_Threat_Intelligence-780x365.jpg

Research: Cyber threat intelligence and the dark web – Overseeing current approaches

Research studies that analyze information regarding various communities on the deep web and dark web have unfolded novel angles in the domain of security informatics. The existence of dark web communities that operate with high levels of anonymity opens the door for data driven approaches that target different means of adversarial reasoning. Such approaches would require certain data that is ... Read More »

legal highs.jpg

Research: Did legislative changes really restrict the use of “legal highs”?

Even though the Psychoactive Substance Act (2016) seems to have more or less curbed the circulation of legal highs, which are currently referred to as “novel psychoactive substances,” a recently published paper in the Pharmaceutical Journal has proven that legislation may boost their sales on the dark web and elsewhere. With more than 700 novel psychoactive substances reported across Europe, ... Read More »

dark-web risk.jpg

Research: Mitigating risks via the dark web

The “dark web” has proven that it deserves its moniker. The dark web is a hidden part of the world wide web that can only be accessed via special forms of software that render users untraceable and anonymous. The dark web is the preferred arena for criminals, whistleblowers, political activists, and others who engage in a scurrying online ecosystem. Regrettably, ... Read More »

CyberGhost Review

Virtual Private Network (or VPN) service provides online security and anonymity to millions of users around the world. It encrypts your data and creates a tunnel around it to prevent IP address leakage. It also allows its users to bypass georestriction and access websites and content they usually cannot from their location. By design, VPN software connects you to the ... Read More »

Tor parasite.png

Research: Can we consider darknets as parasites?

Infrastructures and platforms have been turned into concepts that can help us understand large sized computational systems. The distinction between an infrastructure and a platform represents a debate. A recently published article uses the concept of darknet networks to illustrate how infrastructures are more or less public, while platforms are more associated with private relations. The article analyzes how darknets ... Read More »

drugs1.jpg

Research: Assessing the link between the physical and virtual illicit drug markets

Illicit drug trading in the physical world has represented the subject of many research studies and is very well documented in academic literature. However, individuals involved in illicit drug trading have recently adopted innovative technologies to boost their profits and evade being caught by law enforcement agencies. Darknet marketplaces have been increasingly transforming the drug trafficking business during the past ... Read More »

Tor1.png

Research: Modernizing CollecTor’s ability to collect and archive Tor’s network data

The Tor network protects internet users against censorship, tracking, and surveillance. Tor is composed of thousands of relay nodes, or servers, run by volunteers who are distributed across the globe to enable users to connect privately to internet services. Continuous network evaluation is pivotal in order to react to censorship events, to adapt the Tor browser to dynamic network conditions, ... Read More »

darknet-market1.jpg

Research: Addressing the growth of darknet drug trading in the US

The use and popularity of the black darknet drug market in the US have been increasing in the past few years. The anonymity offered by darknet marketplaces enables users to steer clear of law enforcement. Current policy is centered on the identification of administrators of darknet marketplaces and the immediate shutdown of their platforms. Even though this policy has led ... Read More »

drugforsale2.jpg

Research: Analyzing the use of messaging and social media apps to trade and access drugs

Drug suppliers have been increasingly using modern technologies to boost profits and minimize risk during the past few years. Even though a large number of research studies have examined drug sales via surface internet pharmacies as well as darknet marketplaces, no research studies have delved into the role of smartphone messaging applications and social media in the modern drug economy. ... Read More »

ICO1.jpeg

Research: How can disclosure and dissemination of information affect levels of trust in crypto-markets?

The cryptocurrency market represents a unique chance to analyze a market with an estimated unregulated capital exceeding $13 billion, which was raised via initial coin offerings (ICOs). A recently published paper in the London Business School Review attempts to identify how much confidence investors can have in crypto markets. The paper analyzes data from more than 750 ICOs that were ... Read More »

Research: Is illicit fentanyl desired by or imposed on opioid users?

Recently, illicitly produced fentanyl, and fentanyl analogues, have been rapidly emerging in countries all over the world. Fentanyl is usually disguised as heroin or prescription pills, which results in increased overdose mortality. This phenomenon can be explained by reduced expenses and risk to heroin sellers, heroin shortages, buyer preferences for rapid acting, strong opioids, and the increased popularity of darknet ... Read More »