Multidimensional Forensic Investigation of Onion Sites Based on Fuzzy Encoded LSTM

Main Article Content

Preeti S. Joshi , Dinesha H.A.

Abstract

The only way to access onion services is via the TOR browser providing anonymity and privacy to the client as well as the server. Information about these hidden services and the contents available on them cannot be gathered like websites on the surface web. So, they become a fertile ground for illegal content dissemination and hosting for cybercriminals. There is a persistent need to classify and block such content from onion sites. In this paper, we investigate data requested from onion services to help law enforcement agencies collect traces of cybercrime on these hidden services. We propose a system using fuzzy encoded LSTM to analyze contents retrieved from these sites and raise alerts if found illegal. The accuracy of fuzzy-encoded LSTM is found to be 81.04 % and it outperforms other classifiers.

Article Details

Section
Articles
Author Biography

Preeti S. Joshi , Dinesha H.A.

[1]Preeti S. Joshi

2Dinesha H.A.

 

[1] Research Scholar, Dept. of CSE, VTU, Belgavi, Karnataka, India & Assistant Professor, Dept. of IT, Marathwada Mitramandal’s College of Engg. Pune, India

preetijoshi@mmcoe.edu.in

2Professor (CSE) and Dean (R&D), Shridevi Institute of Engineering and Technology & Founder and Chief Executive Director, Cybersena (R&D) India Private Limited.

Tumakuru, Karnataka, India dineshameet@gmail.com

 

 

References

https://metrics.torproject.org/

Tobias Hoeller, Michael Roland, and René Mayrhofer. 2021. On the state of V3 onion services. In Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet. Association for Computing Machinery, New York, NY, USA, 50–56. https://doi.org/10.1145/3473604.3474565

Montieri, D. Ciuonzo, G. Aceto and A. Pescapé; “Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)”; in IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 3, pp. 662-675, 1 May-June 2020, doi: 10.1109/TDSC.2018.2804394.

Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2018. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery, New York, NY, USA, 1962–1976. https://doi.org/10.1145/3243734.3243824

Florian Platzer, Marcel Schäfer, and Martin Steinebach. 2020. Critical traffic analysis on the tor network. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, Article 77, 1–10. https://doi.org/10.1145/3407023.3409180

Joshi, P.S., Dinesha, H.A. (2023). Study Report of Tor Antiforensic Techniques. In: Kumar, A.,Ghinea, G., Merugu, S. (eds) Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. ICCIC 2022. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-99-2742-5_9

Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, and Flavio Lombardi. 2017. Exploring and Analyzing the Tor Hidden Services Graph. ACM Trans. Web 11, 4, Article 24 (November 2017), 26 pages. https://doi.org/10.1145/3008662

Alex Biryukov, Ivan Pustogarov, Fabrice Thill, and Ralf-Philipp Weinmann. 2014. Content and Popularity Analysis of Tor Hidden Services. In Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE Computer Society, USA, 188–193. https://doi.org/10.1109/ICDCSW.2014.20

Gareth Owen and Nick Savage. 2016. Empirical analysis of Tor Hidden Services. IET Information Security 10, 3 (May 2016), 113–118. https://doi.org/10.1049/iet-ifs.2015.0121

Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, and York Yannikos. 2019. Detection and Analysis of Tor Onion Services. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, Article 66, 1–10. https://doi.org/10.1145/3339252.3341486

T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, “Surfacing collaborated networks in dark web to find illicit and criminal content”; 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 2016, pp. 109-114, doi:10.1109/ISI.2016.7745452.

Alkhatib, Bassel &; Basheer, Randa. (2019). Crawling the Dark Web: A Conceptual Perspective, Challenges and Implementation. Journal of Digital Information Management. 17. 51.

6025/jdim/2019/17/2/51-60.

York Yannikos, Julian Heeger, and Maria Brockmeyer. 2019. An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES). Association for Computing Machinery, New York, NY, USA, Article 50, 1–7. https://doi.org/10.1145/3339252.3341485

Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, Laura Fernández-Robles, ToRank: Identifying the most influential suspicious domains in the Tor network, Expert Systems with Applications, Volume 123, 2019, Pages 212-226, ISSN 0957-4174, https://doi.org/10.1016/j.eswa.2019.01.029.

Iskander Sanchez-Rola, Davide Balzarotti, and Igor Santos. 2017. The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. In Proceedings of the 26th International Conference on the World Wide Web. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 1251–1260. https://doi.org/10.1145/3038912.3052657

Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre, and Ivan de Paz. 2017. Classifying Illegal Activities on Tor Network Based on Web Textual Contents. In Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers, pages 35–43, Valencia, Spain. Association for Computational Linguistics.

S. M. M. Monterrubio, J. E. A. Naranjo, L. I. B. López and Á. L. V. Caraguay; “Black Widow Crawler for TOR network to search for criminal patterns”; 2021 Second International Conference on Information Systems and Software Technologies (ICI2ST), Quito, Ecuador, 2021, pp. 108-113, doi: 10.1109/ICI2ST51859.2021.00023.

Qian Li, Hao Peng, Jianxin Li, Congying Xia, Renyu Yang, Lichao Sun, Philip S. Yu, and Lifang He. 2022. A Survey on Text Classification: From Traditional to Deep Learning. ACM Trans. Intell. Syst. Technol. 13, 2, Article 31 (April 2022), 41 pages. https://doi.org/10.1145/3495162

Liu, B., Zhou, Y. & Sun, W. Character-level text classification via convolutional neural network and gated recurrent unit. Int. J. Mach. Learn. &; Cyber. 11, 1939–1949 (2020). https://doi.org/10.1007/s13042-020-01084-9

Yoon Kim, Yacine Jernite, David Sontag, and Alexander M. Rush. 2016. Character-aware neural language models. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI Press, 2741–2749.

Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pages 1746–1751, Doha, Qatar. Association for Computational Linguistics.

G. Arevian,; “Recurrent Neural Networks for Robust Real-World Text Classification”, IEEE/WIC/ACM International Conference on Web Intelligence, Fremont, CA, USA, 2007, pp. 326-329, doi: 10.1109/WI.2007.126.

Shervin Minaee, Nal Kalchbrenner, Erik Cambria, Narjes Nikzad, Meysam Chenaghlu, and Jianfeng Gao. 2021. Deep Learning--based Text Classification: A Comprehensive Review. ACM Comput. Surv. 54, 3, Article 62 (April 2022), 40 pages. https://doi.org/10.1145/3439726

Pengfei Liu, Xipeng Qiu, Xinchi Chen, Shiyu Wu, and Xuanjing Huang. 2015. Multi-Timescale Long Short-Term Memory Neural Network for Modeling Sentences and Documents. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pages 2326–2335, Lisbon, Portugal. Association for Computational Linguistics.

Peng Zhou, Zhenyu Qi, Suncong Zheng, Jiaming Xu, Hongyun Bao, and Bo Xu. 2016. Text Classification Improved by Integrating Bidirectional LSTM with Two-dimensional Max Pooling. In Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, pages 3485–3495, Osaka, Japan. The COLING 2016 Organizing Committee.

Graves and J. Schmidhuber, “Framewise phoneme classification with bidirectional LSTM networks”; Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005., Montreal, QC, Canada, 2005, pp. 2047-2052 vol. 4, doi: 10.1109/IJCNN.2005.1556215.

H. Hu, M. Liao, C. Zhang and Y. Jing; “Text classification based recurrent neural network”, 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 2020, pp. 652-655, doi: 10.1109/ITOEC49072.2020.9141747.

M. Shobana, V. R. Balasraswathi, R. Radhika, Ahmed Kareem Oleiwi, Sushovan Chaudhury, Ajay S. Ladkat, Mohd Naved, Abdul Wahab Rahmani, "Classification and Detection of Mesothelioma Cancer Using Feature Selection-Enabled Machine Learning Technique'', BioMed Research International, vol. 2022, Article ID 9900668, 6 pages, 2022. https://doi.org/10.1155/2022/9900668

Ajay S. Ladkat, Sunil L. Bangare, Vishal Jagota, Sumaya Sanober, Shehab Mohamed Beram, Kantilal Rane, Bhupesh Kumar Singh, "Deep Neural Network-Based Novel Mathematical Model for 3D Brain Tumor Segmentation", Computational Intelligence and Neuroscience, vol. 2022, Article ID 4271711, 8 pages, 2022. https://doi.org/10.1155/2022/4271711

Sunil L. Bangare, "Classification of optimal brain tissue using dynamic region growing and fuzzy min-max neural network in brain magnetic resonance images", Neuroscience Informatics,Volume 2, Issue 3,2022, 100019, ISSN 2772-5286, https://doi.org/10.1016/j.neuri.2021.100019.

S.L. Bangare, G. Pradeepini, S.T. Patil, “Regenerative pixel mode and tumor locus algorithm development for brain tumor analysis: a new computational technique for precise medical imaging”, International Journal of Biomedical Engineering and Technology 27.1-2 (2018): 76-85. https://doi.org/10.1504/IJBET.2018.093087