Font Size: a A A

Design And Implements Of Dark Web Scanning System Based On Injection

Posted on:2019-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:S YinFull Text:PDF
GTID:2348330545958511Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of anonymous communication technology,more and more users begin to adopt anonymous communication means to protect their privacy.As the most popular application in anonymous communication system,Tor can prevent traffic sniffing and eavesdropping effectively.Tor built the cornerstone and order of "dark web".However,"dark web" is also used by many criminals while protecting the privacy of users.These criminals use dark web as a means of avoiding regulation.The existence of "dark web" makes the original illegal transaction on the surface web more difficult to be monitored.As the tip of the iceberg in "Deep Web",there are too many unknown sides.In this paper,we design and implement a dark web scanning system based on node injection to discover hidden services in dark network and analyze the composition of dark web.The system designed in this paper includes the following sections:1.Based on the principle of Tor anonymous communication and the design specification of hidden service protocol in Tor,this paper studies the hidden service discovery method in dark web and designs a hidden service discovery module to find the hidden service in dark web.This module mainly revises the parts related to the hidden service descriptor storage in Tor source code.After the modification,Tor can decode the descriptor uploaded by the hidden server into the original hidden service,so as to realize the discovery of the hidden service.2.Study the method of hidden service life cycle decision in dark web and design hidden service life cycle decision module.The module mainly determines the surviving status of the hidden service based on the validity of the hidden service descriptor,and then analyzes the hidden service life cycle according to the surviving status of the hidden service.3.Based on the characteristics of dark network,we study the method of accessing dark web and the strategy of dark web crawler and design dark web distributed crawler module to crawl hidden service contents in dark web.4.Design and implementation of hidden service profiling module.This module analyzes the popularity of hidden services based on the anonymous user's access to hidden service descriptors and the link between hidden services.5.Based on the hidden service content crawled by the dark web distributed crawler module,this paper designs a hidden service content classification module to classify the obtained hidden service content,and then analyzes the composition of dark web.
Keywords/Search Tags:tor, dark web, hidden service
PDF Full Text Request
Related items