Abstract
Tor is the most well-known anonymity network that protects the identity of both content providers and their clients against any tracking on the Internet. The previous research on Tor investigated either the security and privacy concerns or the information and hyperlink structure. However, there is still a lack of knowledge about the information leakage attributed to the links from Tor hidden services to the surface Web. This work addresses this gap by a broad evaluation on: (a) the network of links from Tor to the surface Web, (b) the vulnerability of Tor hidden services against the information leakage, (c) the changes in the overall hyperlink structure of Tor hidden services caused by linking to surface websites, and (d) the type of information and services provided by the domains with significant impact on Tor’s network. The results recover the dark-to-surface network as a single massive, connected component where over 90% of identified Tor hidden services have at least one link to the surface world. We also identify that Tor directories significantly contribute to both communication and information dissemination through the network. Our study is the product of crawling approximately 2 million pages from 23,145 onion seed addresses, over a three-month period.
Similar content being viewed by others
Notes
Mozilla/5.0 (X11; Linux \(x86\_64\)) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.102 Safari/537.36
All self-loops and multi edges have been removed from this graph.
content is defined as any string outside of a markdown tag.
3wcwjjnuvjyazeza.onion
It is calculated for networks with no multiple edges.
Pyrowiki is a domain that serves as a pyrotechnics drug wiki.
References
Paul, S., Dingledine, R., Mathewson, N.: The Second-generation Onion Router. In Usenix Security, Tor (2004)
Chertoff, M., Simon, T.: The impact of the dark web on internet governance and cyber security. Global Commission on Internet Governance. No. 6 (2015). https://www.cigionline.org/sites/default/files/ gcig_paper_no6.pdf. Accessed 15 Oct 2015
Henri, V.: The dark web: Some thoughts for an educated debate. Canadian J. Law Technol. 15(1), 85–98 (2017)
Ian, C., Oskar, S., Matthew, T., Verendel, V.: The dark freenet. Network, Private communication through a network of trusted connections (2010)
David, G., Michael, R., Paul, S.: Onion Routing for Anonymous and Private Internet Connections. Technical Report, NAVAL Research Lab Washington DC Center For High Assurance Computing Ssystems (1999)
Sanchez-Rola, I., Balzarotti, D., Santos, I.: The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1251–1260, (2017)
Bernaschi, M., Celestini, A., Guarino, S., Lombardi, F., Mastrostefano, E.: Spiders like onions: on the network of tor hidden services. In: The World Wide Web Conference, pp. 105–115 (2019)
Burda, P., Boot, C., Allodi, L.: Characterizing the redundancy of darkweb. Onion services. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, page 19 (2019)
Griffith, V., Xu, Y., Ratti, C.: Graph theoretic properties of the darkweb. arXiv preprint arXiv:1704.07525 (2017)
Zabihimayvan, M., Sadeghi, R., Doran, D., Allahyari, M.: A broad evaluation of the tor english content ecosystem. In: Proceedings of the 10th ACM Conference on Web Science, pp. 333–342 (2019)
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: understanding the tor network. In: Privacy Enhancing Technologies, pp. 63–76 (2008)
Biryukov, A., Pustogarov, I., Weinmann, R.-P.: Trawling for tor hidden services: Detection, measurement, deanonymization. In: Symposium on Security and Privacy, pp. 80–94 (2013)
Biryukov, A., Pustogarov, I.: Bitcoin over tor isn’t a good idea. In: 2015 IEEE Symposium on Security and Privacy, pp. 122–134 (2015)
Cambiaso, E., Vaccari, I., Patti, L., Aiello, M.: Darknet security: a categorization of attacks to the tor network. In: Italian Conference on Cybersecurity, (2019)
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11–20 (2007)
Sanatinia, A., Noubir, G.: Off-path man-in-the-middle attack on tor hidden services. New England Security Day (2017)
Sanatinia, A., Park, J., Blass, E.-O., Mohaisen, A., Noubir, G.: A privacy-preserving longevity study of tor’s hidden services. arXiv preprint arXiv:1909.03576 (2019)
Mohaisen, A., Ren, K.: Leakage of onion at the dns root: measurements, causes, and countermeasures. IEEE/ACM Trans. Netw. 25(5), 3059–3072 (2017)
Cambiaso, E., Vaccari, I., Patti, L., Aiello, M.: Darknet security: a categorization of attacks to the tor network. In: Italian Conference on Cyber Security (2019)
Rajawat, A. S., Rawat, R., Barhanpurkar, K., Shaw, R. N., Ghosh, A.: Vulnerability analysis at industrial internet of things platform on dark web network using computational intelligence. Comput. Intell. Syst. Appl. 39–51 (2021)
Xu, J., Hsinchun, C.: The topology of dark networks. Commun. ACM 51(10), 58–65 (2008)
Massimo, B., Alessandro, C., Stefano, G., Flavio, L.: Exploring and analyzing the tor hidden services graph. ACM Trans. Web 11(4), 24 (2017)
Zabihimayvan, M., Sadeghi, R., Kadariya, D., Doran, D.: Interaction of structure and information on tor. In: International Conference on Complex Networks and Their Applications, pp. 296–307. Springer (2020)
Dolliver, D.S., Ericson, S.P., Love, K.L.: A geographic analysis of drug trafficking patterns on the tor network. Geograph. Rev. 108(1), 45–68 (2018)
Dolliver, D.S., Kuhns, J.B.: The presence of new psychoactive substances in a tor network marketplace environment. J. Psycho. Drugs 48(5), 321–329 (2016)
Harviainen, J.T., Haasio, A., Ruokolainen, T., Hassan, L., Siuda, P., Hamari, J.: Information protection in dark web drug markets research. In: Proceedings of the 54th Hawaii International Conference on System Sciences, p 4673, (2021)
Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 213–224 (2013)
Dolliver, D.S.: Evaluating drug trafficking on the tor network: Silk road 2, the sequel. Int. J. Drug Policy 26(11), 1113–1123 (2015)
Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., Weimann, G.: Uncovering the dark web: a case study of jihad on the web. J. Am. Soc. Inf. Sci. Technol. 59(8), 1347–1359 (2008)
Mörch, C.-M., Côté, L.-P., Corthésy-Blondin, L., Plourde-Léveillé, L., Dargis, L., Mishara, B.L.: The darknet and suicide. J. Affect. Disorders 241, 127–132 (2018)
Woodhams, J., Kloess, J.A., Jose, B., Hamilton-Giachritsis, ,: Characteristics and behaviors of anonymous users of dark web platforms suspected of child sexual offenses. Front. Psychol., 12 (2021)
Biryukov, A., Pustogarov, I., Thill, F., Weinmann, R.-P.: Content and popularity analysis of tor hidden services. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, pp. 188–193 (2014)
Faizan, M., Khan, R.A.: Exploring and analyzing the dark web: a new alchemy. First Monday (2019)
Andrei, B., Ravi, K., Farzin, M., Prabhakar, R., Sridhar, R., Raymie, S., Andrew, T., Janet, W.: Graph structure in the web. Comput. Netw. 33(1–6), 309–320 (2000)
Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)
Hulpus, I., Hayes, C., Karnstedt, M., Greene, D.: Unsupervised graph-based topic labelling using dbpedia. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, pp. 465–474 (2013)
Zabihimayvan, M., Doran, D.: Some (non-) universal features of web robot traffic. In: Annual Conference on Information Sciences and Systems, pp. 1–6 (2018)
Newman, M.E.J., Michelle, G.: Finding and evaluating community structure in networks. Phys. Rev. E 69(2), 026113 (2004)
Hage, P., Harary, F.: Eccentricity and centrality in networks. Soc. Netw. 17(1), 57–63 (1995)
Brandes, U.: A faster algorithm for betweenness centrality. J. Math. Sociol. 25(2), 163–177 (2001)
Barabasi, A.-L., Oltvai, Z.N.: Network biology: understanding the cell’s functional organization. Nature Rev. Genet. 5(2), 101 (2004)
Mao, G., Zhang, N.: Analysis of average shortest-path length of scale-free network. J. Appl. Math (2013). https://doi.org/10.1155/2013/865643
Liu, J., Ge, H.: Collaboration mechanisms and community detection of statisticians based on ergms and knn-walktrap. Comput. Stat. Data Anal. 168, 107372 (2021)
Acknowledgements
The statements made herein are solely the responsibility of the authors. The authors appreciate the anonymous reviewers for their useful feedback regarding this article. Thanks should also go to Dr. Reza Sadeghi with his constructive criticism of the manuscript.
Funding
Not applicable
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/Competing interests
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Ethics approval
The manuscript in part or in full has not been submitted or published anywhere.
Code availability
All the experiments used in this research have been conducted using Cytoscape 3.0.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zabihimayvan, M., Doran, D. A first look at references from the dark to the surface web world: a case study in Tor. Int. J. Inf. Secur. 21, 739–755 (2022). https://doi.org/10.1007/s10207-022-00580-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-022-00580-z