Home » Articles


Prime partitioned blockchain 2.PNG

Research: Tor and the blockchain – Cybercriminals’ unmatchable combination

Law enforcement agencies are currently faced by enormous challenges when having to investigate and analyze a cybercrime. Most of these challenges can be attributed to the wide availability of anonymity browsing software and cryptocurrencies. A recently published paper aims at examining how anonymity browsing software, such as Tor, in combination with cryptocurrencies, pose a great challenge during investigation of a ... Read More »

Research: I2P based anonymous network protocol developed via Rust programming language

With more and more people concerned about their online privacy, anonymous network protocols have been advancing at an amazing rate. However, the levels of privacy of data transmission on public networks still represent the weakest link in the chain of information security. Presently, popular network encryption tools, such as VPNs, utilize a single link network framework. Whenever a node fails ... Read More »


Cryptojacking – Hijacking computational resource for cryptocurrency profits

The year 2017 was definitely “the year of bitcoin” as its value skyrocketed from $900 up to $20,000 during this year. This amazing increase in the value of bitcoin turned speculators and hobbyists into millionaires. The cryptocurrency “gold rush” enticed a large number of people globally to invest not only in bitcoin, but also in hundreds of other cryptocurrencies whose ... Read More »

An overview of bitcoin ransomware attack campaigns

According to a research study conducted by Cybersecurity Ventures in 2017, a business is compromised by a ransomware attack every 40 seconds, and this rate is estimated to increase up to an attack every 14 seconds in 2019. Businesses have been forced to pay cybercriminals up to $1 million within a single ransomware attack, whereas others suffered losses that summed ... Read More »


Research: Forensic analysis of six anonymous internet browsers

Cybercrime has evolved to become a challenging problem during the past few years. Cybercriminals rely on the dark web to sell various hacking and malicious tools on darknet marketplaces including ransomware, DDoS attack tools, Crimeware-as-a-service (CaaS), and others. Users can currently use the Tor browser bundle, with incognito properties, to access the dark web and conduct transactions in darknet marketplaces. ... Read More »


Research: An efficient Tor crawler

The Tor network is by far the most popular darknet, which not only facilitates anonymous browsing, but also hosts a large number of illicit marketplaces, as well as multiple forms of illegal activities. The Tor protocol protects hosted websites, which are known as hidden services, against undesirable tracking and surveillance. The number of Tor based hidden services has been steadily ... Read More »


Research: The Fourth Amendment and darknet drug dealers

The anonymity offered via the Tor network, and other parts of the dark web, has helped the online drug trading business flourish during the past few years. Law enforcement agencies face great challenges in order to monitor and take down dark web drug marketplaces. One of these challenges involves protecting the human rights of potential dark web drug dealers. A ... Read More »


What do young people think of the dark web? A survey

The dark web represents parts of the internet that can be only accessed via special software, such as the Tor browser bundle. The anonymity offered via the dark web has helped many forms of illegal activities flourish on these darker parts of the internet. However, the dark web also hosts many forms of legal activities, especially related to helping whistleblowers ... Read More »


Research: Business strategies adopted across darknet marketplaces

Over the past few years, many researchers have attempted to explore darknet marketplaces to analyze this novel form of illegal e-commerce. From an economic point of view, a darknet marketplace, or a crypto market, can be defined as a virtual tripartite market comprised of anonymous vendors, merchandise, and customers. In this context, a crypto market represents a good example of ... Read More »


Research: Classifying illegal content on dark web forums

The activities instigated by cybercriminals on the dark web are increasingly becoming one of the most critical issues influencing societies all over the world. The anonymity and privacy offered via the dark web have qualified it as the preferred online environment for a myriad of illegal activities. Cybercriminals are currently using darknets for various forms of illegal activities including illicit ... Read More »


Research: ToRank – A novel system for identification of suspicious and malicious Tor hidden services

The Tor network currently hosts thousands of hidden services. A significant proportion of these hidden services can be associated with harmful and suspicious activities. Many onion domains have been linked to distribution of malware. In 2013, Freedom Hosting, a company that hosted Tor hidden services, was found to spread malware on all hidden services hosted on its servers. This malware ... Read More »

Research: A novel model of extraction of data from the deep web

With the rapid development of modern society, people’s need for information interaction is surging with the advent of the internet. With the help of the world wide web, information can disseminate quickly, and the forms through which information may be shared are increasing, including documents, pictures, audio clips, videos, hyperlinks, forms, and many more. The surged demand for web information ... Read More »

BTC 30.1.1.PNG

Exploring the best means for estimating bitcoin price volatility – A research study

It is inarguable that cryptocurrencies, namely bitcoin, have attracted considerable attention during the past few years. This can be attributed to the innovative features of their underlying blockchain technology, the anonymity of their transactions and their decentralized framework that omits the need for intermediaries or third parties. However, being a highly volatile investment asset, many individuals are reluctant to participate ... Read More »


Research: Cryptocurrencies integrated with the dark web

The blockchain technology, which is the basis of cryptocurrencies, is expected to totally transform the global financial system during the next few years. The anonymity offered by many cryptocurrencies represents one of the main features enticing individuals, as well as organizations, to use cryptocurrencies instead of traditional fiat currencies. The dark web has also gained much attention lately, since it ... Read More »