skip to main content
10.1145/2851613.2851798acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Out-of-band discovery and evaluation for tor hidden services

Authors Info & Claims
Published:04 April 2016Publication History

ABSTRACT

Tor is one of the most well-known anonymity networks that provides anonymity to service providers such as hidden web services. Recently size and content of Tor hidden services are highly concerned because of emerging illegal content. It is necesary to have discovery and analysis approaches to collect and analyze Tor hidden services. Previous in-band approaches are mostly based on the protocol and design principles of Tor network, which mostly have a great deal of resource consumption. In this paper, we propose an out-of-band approach to discover Tor hidden services, which is simpler and owns less resource consumption: using multiple search engines with specific keywords. In our experiments we collected 173667 unique .onion addresses in all using a single Amazon EC2 instances in 1 hour and found 4857 hidden web services online. We also propose a modified PageRank algrithm: OnionRank Algorithm to evaluate the importance of hidden web services, which concentrates more on Tor users' actions. Results showed that the top-ranking hidden web services are mostly famous in Tor network.

References

  1. Tor hidden service protocol. https://www.torproject.org/docs/hidden-services.html.en.Google ScholarGoogle Scholar
  2. Tor metrics: Unique onion addresses. https://metrics.torproject.org/hidserv-dir-onions-seen.html.Google ScholarGoogle Scholar
  3. Tor2web brings anonymous tor sites to the regular web. http://arstechnica.com/uncategorized/2008/12/tor2web-brings-anonymous-tor-sites-to-the-regular-web/.Google ScholarGoogle Scholar
  4. Wikipedia, agroa. https://en.wikipedia.org/wiki/Agora.Google ScholarGoogle Scholar
  5. Wikipedia, deepdotweb. https://en.wikipedia.org/wiki/DeepDotWeb.Google ScholarGoogle Scholar
  6. Wikipedia, facebook. https://en.wikipedia.org/wiki/Facebook.Google ScholarGoogle Scholar
  7. Wikipedia, ramp. https://en.wikipedia.org/wiki/Russian Anonymous Marketplace.Google ScholarGoogle Scholar
  8. Wikipedia, the hidden wiki. https://en.wikipedia.org/wiki/The Hidden Wiki.Google ScholarGoogle Scholar
  9. Wikipedia, tor2web. https://en.wikipedia.org/wiki/Tor2web.Google ScholarGoogle Scholar
  10. A. Arasu, J. Cho, H. Garcia-Molina, A. Paepcke, and S. Raghavan. Searching the web. ACM Transactions on Internet Technology (TOIT), 1(1):2--43, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Biryukov, I. Pustogarov, F. Thill, and R.-P. Weinmann. Content and popularity analysis of tor hidden services. In Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on, pages 188--193. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Biryukov, I. Pustogarov, and R. Weinmann. Trawling for tor hidden services: Detection, measurement, deanonymization. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 80--94. IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84--90, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004.Google ScholarGoogle Scholar
  15. D. Goulet, A. Johnson, G. Kadianakis, and K. Loesing. Hidden-service statistics reported by relays. Technical report, DTIC Document, 2015.Google ScholarGoogle Scholar
  16. K. Loesing, W. Sandmann, C. Wilms, and G. Wirtz. Performance measurements and statistics of tor hidden services. In Applications and the Internet, 2008. SAINT 2008. International Symposium on, pages 1--7. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Matic, P. Kotzias, and J. Caballero. Caronte: Detecting location leaks for deanonymizing tor hidden services. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 1455--1466. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. J. Murdoch. Hot or not: Revealing hidden services by their clock skew. In Proceedings of the 13th ACM conference on Computer and communications security, pages 27--36. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Øverlier and P. Syverson. Locating hidden servers. In Security and Privacy, 2006 IEEE Symposium on, pages 15--pp. IEEE, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. Øverlier and P. Syverson. Improving efficiency and simplicity of tor circuit establishment and hidden services. In Privacy Enhancing Technologies, pages 134--152. Springer, 2007. Google ScholarGoogle ScholarCross RefCross Ref
  21. L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: bringing order to the web. 1999.Google ScholarGoogle Scholar
  22. A. Panchenko, O. Spaniol, A. Egners, and T. Engel. Lightweight hidden services. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pages 533--540. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Thomas and A. Mohaisen. Measuring the leakage of onion at the root.Google ScholarGoogle Scholar
  24. S. Zander and S. J. Murdoch. An improved clock-skew measurement technique for revealing hidden services. In USENIX Security Symposium, pages 211--226, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Out-of-band discovery and evaluation for tor hidden services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAC '16: Proceedings of the 31st Annual ACM Symposium on Applied Computing
      April 2016
      2360 pages
      ISBN:9781450337397
      DOI:10.1145/2851613

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 April 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SAC '16 Paper Acceptance Rate252of1,047submissions,24%Overall Acceptance Rate1,650of6,669submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader