Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang
{"title":"匿名网络下非法地下互联网生产的智能挖掘研究——以个人信息交易为例","authors":"Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang","doi":"10.1109/ITNEC56291.2023.10081964","DOIUrl":null,"url":null,"abstract":"As law enforcement agencies continue to strengthen their efforts to crack down on illegal underground Internet production trading activities, criminals gradually transfer illegal personal information trading and other illegal products, as well as other related crimes, to anonymous networks. Taking Tor dark network as the target, this paper designs active node detection methods and passive node detection methods to obtain criminal intelligence on the dark network. Through the design of the dark web crawler, a large number of personal information transaction related data were obtained. At the same time, the data were analyzed in time, space, type and theme dimensions, forming effective and targeted information. The intelligence mining method proposed in this paper can effectively collect the data related to the subject, form the multi-dimensional analysis results that can be displayed according to the needs, and provide certain technical support for the law enforcement agencies to fight against the hidden network crime.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Intelligence Mining of Illegal Underground Internet Production on Anonymous Network : Taking Personal Information Trading as an Example\",\"authors\":\"Guangxuan Chen, Guangxiao Chen, Di Wu, Qiang Liu, Lei Zhang\",\"doi\":\"10.1109/ITNEC56291.2023.10081964\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As law enforcement agencies continue to strengthen their efforts to crack down on illegal underground Internet production trading activities, criminals gradually transfer illegal personal information trading and other illegal products, as well as other related crimes, to anonymous networks. Taking Tor dark network as the target, this paper designs active node detection methods and passive node detection methods to obtain criminal intelligence on the dark network. Through the design of the dark web crawler, a large number of personal information transaction related data were obtained. At the same time, the data were analyzed in time, space, type and theme dimensions, forming effective and targeted information. The intelligence mining method proposed in this paper can effectively collect the data related to the subject, form the multi-dimensional analysis results that can be displayed according to the needs, and provide certain technical support for the law enforcement agencies to fight against the hidden network crime.\",\"PeriodicalId\":218770,\"journal\":{\"name\":\"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)\",\"volume\":\"161 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNEC56291.2023.10081964\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC56291.2023.10081964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Intelligence Mining of Illegal Underground Internet Production on Anonymous Network : Taking Personal Information Trading as an Example
As law enforcement agencies continue to strengthen their efforts to crack down on illegal underground Internet production trading activities, criminals gradually transfer illegal personal information trading and other illegal products, as well as other related crimes, to anonymous networks. Taking Tor dark network as the target, this paper designs active node detection methods and passive node detection methods to obtain criminal intelligence on the dark network. Through the design of the dark web crawler, a large number of personal information transaction related data were obtained. At the same time, the data were analyzed in time, space, type and theme dimensions, forming effective and targeted information. The intelligence mining method proposed in this paper can effectively collect the data related to the subject, form the multi-dimensional analysis results that can be displayed according to the needs, and provide certain technical support for the law enforcement agencies to fight against the hidden network crime.