{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:50:58Z","timestamp":1726851058231},"reference-count":26,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1005804","61632009","62172159","2017A030308006","2021JJ30294"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,11,22]]},"abstract":"With the increase of data in the network, the load of servers and communication links becomes heavier and heavier. Edge computing can alleviate this problem. Due to a sea of malicious contents in Darknet, it is of high research value to combine edge computing with content detection and analysis. Therefore, this paper illustrates an intelligent classification system based on machine learning and Scrapy that can detect and judge fleetly categories of services with malicious contents. Because of the nondisclosure and short survival time of Tor Darknet domain names, obtaining uniform resource locators (URLs) and resources of the network is challenging. In this paper, we focus on a network based on the Onion Router (tor) anonymous communication system. We designed a crawler program to obtain the contents of the Tor network and label them into six classes. We also construct a dataset which contains URLs, categories, and keywords. Edge computing is used to judge the category of websites. The accuracy of the classifier based on a machine learning algorithm is as high as 89%. The classifier will be used in an operational system which can help researchers quickly obtain malicious contents and categorize hidden services.<\/jats:p>","DOI":"10.1155\/2021\/8072779","type":"journal-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T20:20:07Z","timestamp":1637612407000},"page":"1-13","source":"Crossref","is-referenced-by-count":4,"title":["Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning"],"prefix":"10.1155","volume":"2021","author":[{"given":"Runchuan","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6120-6358","authenticated-orcid":true,"given":"Shuhong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Jiawei","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Entao","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou, Hunan 425199, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.036"},{"key":"2","first-page":"303","article-title":"Tor: the second-generation onion router","author":"S. Paul"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592456"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.09.005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.52922\/sb04534"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.040"},{"issue":"2","key":"7","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1109\/JIOT.2018.2846624","article-title":"Toward a comprehensive insight into the eclipse attacks of tor hidden services","volume":"6","author":"Q. Tan","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2013.15"},{"key":"9","first-page":"43","article-title":"Changing of the guards: a framework for understanding and improving entry guard selection in tor","author":"T. Elahi"},{"issue":"4","key":"10","doi-asserted-by":"crossref","first-page":"2582","DOI":"10.1109\/JIOT.2019.2948315","article-title":"Highly anonymous mobility-tolerant location-based onion routing for vanets","volume":"7","author":"M. Sayad Haghighi","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0064-5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ici2st51859.2021.00023"},{"issue":"2","key":"13","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/TII.2020.2988870","article-title":"Multilevel identification and classification analysis of tor on mobile and pc platforms","volume":"17","author":"L. Wang","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"14","first-page":"540","article-title":"Online identification of tor anonymous communication traffic","volume":"24","author":"G.-F. He","year":"2013","journal-title":"Ruanjian Xuebao\/Journal of Software"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.065"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.14445\/22312803\/ijctt-v10p117"},{"key":"17","first-page":"667","article-title":"Early warnings of cyber threats in online discussions","author":"S. Anna"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2016.08.032"},{"key":"19","article-title":"Data capture and analysis of darknet markets","author":"M. Ball","year":"2021"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099649"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.029"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/jisic.2014.40"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/icdcsw.2014.20"},{"key":"24","first-page":"35","article-title":"Classifying illegal activities on tor network based on web textual contents","author":"M. W. Al Nabki"},{"key":"25","first-page":"245","article-title":"Text classification of illegal activities on onion sites","author":"I. D. Buldin"},{"key":"26","article-title":"Automatic product categorization for anonymous marketplaces","author":"M. B. Graczyk","year":"2015"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/8072779.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/8072779.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/8072779.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T20:20:13Z","timestamp":1637612413000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/8072779\/"}},"subtitle":[],"editor":[{"given":"Ke","family":"Gu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":26,"alternative-id":["8072779","8072779"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8072779","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,11,22]]}}}