A Framework of Darknet Forensics

2Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The dark web market is full of illegal and criminal activities such as the sale of sensitive personal information, guns, drugs, and terrorist videos. Cybercriminals use The Onion Router(TOR) browser to enter the dark web for information publishing and trading. Because the onion router browser provides privacy protection and anonymity, it is widely used. This privacy protection mode has brought great challenges to network investigators. This article aims to detect the use of the latest Tor browser, compare and analyze the evidence information contained in the registry, memory images, hard disk files, and network data packets through forensic experiments. At the same time, it compares and analyzes the different access modes of the Tor browser, and collects and uses Tor browsing. Evidence of cybercrime committed by a device is helpful to the development of electronic data forensics analysis.

Cite

CITATION STYLE

APA

Leng, T., & Yu, A. (2021). A Framework of Darknet Forensics. In ACM International Conference Proceeding Series. Association for Computing Machinery. https://doi.org/10.1145/3503047.3503082

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free