
Tor Hidden Services Discovery and Analysis: A Literature Survey
Author(s) -
Jingjing Bian,
Chunjie Cao,
Longjuan Wang,
Jun Ye,
Yan Zhao,
Chaosheng Tang
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1757/1/012162
Subject(s) - anonymity , construct (python library) , service (business) , computer science , internet privacy , computer security , trace (psycholinguistics) , router , data science , key (lock) , service provider , world wide web , business , computer network , linguistics , philosophy , marketing
Hidden services are a feature of Tor(The Onion Router)[1]. It provides anonymity for the service requester while maintaining the anonymity of the service provider. Since it is quite difficult to trace back and locate both parties in the communication, the criminals use hidden services mechanisms to construct various illegal activities in the darknet, which has brought adverse effects to society. In order to prevent the abuse of Tor hidden services, the discovery and analysis of hidden services are particularly important. The aim of this survey paper is to review and compare the literature of the past five years, provide the readers with methods for discovering tor hidden services, along with the various content analysis methods developed and proposed from time to time. we explain their key ideas and show their interrelations.