Loading

A Prototype Design for a Framework to Analyse the Traffic Flow in Darknet
K. Sowjanya Naidu1, L.S.Chakravarthy2

1K. Sowjanya Naidu, Department of Computer Science and Engineering, Gayatri Vidya Parishad College of Engineering, Visakhapatnam, Andhra Pradesh, India.

2Dr. L. S. Chakravarthy, Department of Computer Science and Engineering, Gayatri Vidya Parishad College of Engineering, Visakhapatnam, Andhra Pradesh, India.

Manuscript received on 15 April 2019 | Revised Manuscript received on 22 April 2019 | Manuscript Published on 26 July 2019 | PP: 1449-1452 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F12950486S419/19©BEIESP | DOI: 10.35940/ijitee.F1295.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The malicious activities in the darknet are an emerging threat to the cyber space. Darknet sites operate using TOR(The Onion Router) hidden services which provides the feature of disguising the users of the transaction in the darknet market place. Hence identifying and monitoring such illegal activities in the marketplace has become a tedious task for the cyber and law enforcement officials. This paper presents a prototype for a framework which analyse the traffic flow in the darknet as finding the exact sender and receiver is almost impossible as the TOR is increasing the layers of security to the maximum extent making it impossible to track the users in the transactions. Here we give a methodology using webcrawlers and extract the data from the darknet sites to find the domain of the traffic flow through which the broad area of traffic can be sorted out which would be beneficial for the cyber and law enforcement agencies to find the illicit trade in the darknet market places.

Keywords: Darknet, TOR, Web Crawler, Marketplaces.
Scope of the Article: Computer Science and Its Applications