Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang
{"title":"Research on Intelligence Mining of Illegal Underground Internet Production on Anonymous Network : Taking Personal Information Trading as an Example","authors":"Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang","doi":"10.1109/ITNEC56291.2023.10081964","DOIUrl":null,"url":null,"abstract":"As law enforcement agencies continue to strengthen their efforts to crack down on illegal underground Internet production trading activities, criminals gradually transfer illegal personal information trading and other illegal products, as well as other related crimes, to anonymous networks. Taking Tor dark network as the target, this paper designs active node detection methods and passive node detection methods to obtain criminal intelligence on the dark network. Through the design of the dark web crawler, a large number of personal information transaction related data were obtained. At the same time, the data were analyzed in time, space, type and theme dimensions, forming effective and targeted information. The intelligence mining method proposed in this paper can effectively collect the data related to the subject, form the multi-dimensional analysis results that can be displayed according to the needs, and provide certain technical support for the law enforcement agencies to fight against the hidden network crime.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC56291.2023.10081964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As law enforcement agencies continue to strengthen their efforts to crack down on illegal underground Internet production trading activities, criminals gradually transfer illegal personal information trading and other illegal products, as well as other related crimes, to anonymous networks. Taking Tor dark network as the target, this paper designs active node detection methods and passive node detection methods to obtain criminal intelligence on the dark network. Through the design of the dark web crawler, a large number of personal information transaction related data were obtained. At the same time, the data were analyzed in time, space, type and theme dimensions, forming effective and targeted information. The intelligence mining method proposed in this paper can effectively collect the data related to the subject, form the multi-dimensional analysis results that can be displayed according to the needs, and provide certain technical support for the law enforcement agencies to fight against the hidden network crime.