{"title":"A Framework of Darknet Forensics","authors":"Tao Leng, Aimin Yu","doi":"10.1145/3503047.3503082","DOIUrl":null,"url":null,"abstract":"The dark web market is full of illegal and criminal activities such as the sale of sensitive personal information, guns, drugs, and terrorist videos. Cybercriminals use The Onion Router(TOR) browser to enter the dark web for information publishing and trading. Because the onion router browser provides privacy protection and anonymity, it is widely used. This privacy protection mode has brought great challenges to network investigators. This article aims to detect the use of the latest Tor browser, compare and analyze the evidence information contained in the registry, memory images, hard disk files, and network data packets through forensic experiments. At the same time, it compares and analyzes the different access modes of the Tor browser, and collects and uses Tor browsing. Evidence of cybercrime committed by a device is helpful to the development of electronic data forensics analysis.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Advanced Information Science and System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3503047.3503082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The dark web market is full of illegal and criminal activities such as the sale of sensitive personal information, guns, drugs, and terrorist videos. Cybercriminals use The Onion Router(TOR) browser to enter the dark web for information publishing and trading. Because the onion router browser provides privacy protection and anonymity, it is widely used. This privacy protection mode has brought great challenges to network investigators. This article aims to detect the use of the latest Tor browser, compare and analyze the evidence information contained in the registry, memory images, hard disk files, and network data packets through forensic experiments. At the same time, it compares and analyzes the different access modes of the Tor browser, and collects and uses Tor browsing. Evidence of cybercrime committed by a device is helpful to the development of electronic data forensics analysis.