2022
DOI: 10.4018/ijcwt.311422
|View full text |Cite
|
Sign up to set email alerts
|

Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks

Abstract: Terrorist groups like ISIS have made considerable use of the dark web (DW) to carry out their malicious objectives such as spreading propaganda, recruiting and radicalizing new recruits, and secretly raising finances. Al-Hayat Media Center, an ISIS media agency, released a link on their forum describing how to access their DW website. It also sent out the identical message over Telegram, which included links to a Tor service with a “.onion” address. This study develops an analytical framework for scraping and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Without a doubt, data is a company's most valuable resource. We dwell on data, where businesses place a high value on sharing, analysing, and gathering data on their users and stakeholders, particularly from social media (Rawat et al 2022 ). Clarity in how organizations obtain authorization to preserve private data, adhere to their privacy laws, and organize the data obtained is critical to establishing confidence with clients who regard security as a primary priority (Om Kumar and Sathia Bhama 2019 , 2021 ; Om Kumar et al 2022 ).…”
Section: Introductionmentioning
confidence: 99%
“…Without a doubt, data is a company's most valuable resource. We dwell on data, where businesses place a high value on sharing, analysing, and gathering data on their users and stakeholders, particularly from social media (Rawat et al 2022 ). Clarity in how organizations obtain authorization to preserve private data, adhere to their privacy laws, and organize the data obtained is critical to establishing confidence with clients who regard security as a primary priority (Om Kumar and Sathia Bhama 2019 , 2021 ; Om Kumar et al 2022 ).…”
Section: Introductionmentioning
confidence: 99%
“…Because the Android operating system is widely used, it is open-source, and we frequently save sensitive data on our mobile devices, rogue code writers write increasingly aggressive scripts every day with the intention of stealing our data. (11) The constant conflict between security professionals and hackers has made malware into a dynamic ecosystem. The malware ecology varies annually as evident from studies.…”
Section: Introductionmentioning
confidence: 99%
“…Different types of IDS, or intrusion detection systems, were developed to investigate any suspicious activity or network traffic to alert us. Many authors implemented IDS using machine and deep learning algorithms with the objective of not only identifying suspicious activities but also taking the appropriate measures to reduce or eliminate those attacks [ 9 , 10 , 11 , 12 , 13 ].…”
Section: Introductionmentioning
confidence: 99%