Criminal motivation on the dark web: A categorisation model for law enforcement

被引:36
作者
Dalins, Janis [1 ,2 ]
Wilson, Campbell [1 ]
Carman, Mark [1 ]
机构
[1] Monash Univ, Fac Informat Technol, 900 Princes Highway, Caulfield, Vic, Australia
[2] Australian Fed Police, 383 La Trobe St, Melbourne, Vic, Australia
关键词
Dark web; Computer forensics; Conceptual models; Focused crawls; Machine learning; Child pornography; Tor motivation model; SEARCH;
D O I
10.1016/j.diin.2017.12.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research into the nature and structure of 'Dark Webs' such as Tor has largely focused upon manually labelling a series of crawled sites against a series of categories, sometimes using these labels as a training corpus for subsequent automated crawls. Such an approach is adequate for establishing broad taxonomies, but is of limited value for specialised tasks within the field of law enforcement. Contrastingly, existing research into illicit behaviour online has tended to focus upon particular crime types such as terrorism. A gap exists between taxonomies capable of holistic representation and those capable of detailing criminal behaviour. The absence of such a taxonomy limits interoperability between agencies, curtailing development of standardised classification tools. We introduce the Tor-use Motivation Model (TMM), a two-dimensional classification methodology specifically designed for use within a law enforcement context. The TMM achieves greater levels of granularity by explicitly distinguishing site content from motivation, providing a richer labelling schema without introducing inefficient complexity or reliance upon overly broad categories of relevance. We demonstrate this flexibility and robustness through direct examples, showing the TMM's ability to distinguish a range of unethical and illegal behaviour without bloating the model with unnecessary detail. The authors of this paper received permission from the Australian government to conduct an unrestricted crawl of Tor for research purposes, including the gathering and analysis of illegal materials such as child pornography. The crawl gathered 232,792 pages from 7651 Tor virtual domains, resulting in the collation of a wide spectrum of materials, from illicit to downright banal. Existing conceptual models and their labelling schemas were tested against a small sample of gathered data, and were observed to be either overly prescriptive or vague for law enforcement purposes - particularly when used for prioritising sites of interest for further investigation. In this paper we deploy the TMM by manually labelling a corpus of over 4000 unique Tor pages. We found a network impacted (but not dominated) by illicit commerce and money laundering, but almost completely devoid of violence and extremism. In short, criminality on this 'dark web' is based more upon greed and desire, rather than any particular political motivations. (c) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:62 / 71
页数:10
相关论文
共 19 条
[1]  
Abbasi Ahmed, 2007, 2007 IEEE Intelligence and Security Informatics, P282, DOI 10.1109/ISI.2007.379486
[2]   Content and popularity analysis of Tor hidden services [J].
Biryukov, Alex ;
Pustogarov, Ivan ;
Thill, Fabrice ;
Weinmann, Ralf-Philipp .
2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, :188-193
[3]   Focused crawling: a new approach to topic-specific Web resource discovery [J].
Chakrabarti, S ;
van den Berg, M ;
Dom, B .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (11-16) :1623-1640
[4]  
Chen H, 2012, INTEGR SER INFORM SY, V30, P1, DOI 10.1007/978-1-4614-1557-2
[5]   Monte-Carlo Filesystem Search - A crawl strategy for digital forensics [J].
Dalins, Janis ;
Wilson, Campbell ;
Carman, Mark .
DIGITAL INVESTIGATION, 2015, 13 :58-71
[6]  
Florescu D., 1998, SIGMOD Record, V27, P59, DOI 10.1145/290593.290605
[7]   A Focused Crawler for Dark Web Forums [J].
Fu, Tianjun ;
Abbasi, Ahmed ;
Chen, Hsinchun .
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2010, 61 (06) :1213-1231
[8]   A review of the available content on Tor hidden services: The case against further development [J].
Guitton, Clement .
COMPUTERS IN HUMAN BEHAVIOR, 2013, 29 (06) :2805-2815
[9]   Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web [J].
Iliou, Christos ;
Kalpakis, George ;
Tsikrika, Theodora ;
Vrochidis, Stefanos ;
Kompatsiaris, Ioannis .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :229-234
[10]   Finding the Linchpins of the DarkWeb: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures [J].
Li, Zhou ;
Alrwais, Sumayah ;
Xie, Yinglian ;
Yu, Fang ;
Wang, XiaoFeng .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :112-126