Network Analysis of Dark Web Traffic Through the Geo-Location of South African IP Address Space

Author(s):  
Craig Gokhale
2019 ◽  
Author(s):  
◽  
Gokhale Craig

This research was supported financially by the BankSeta, the Council on Scientific and Industrial Research and the National Research Foundation with the aim to log The Onion Router (TOR) traffic usage in South Africa. The recent public disclosure of mass surveillance of electronic communications, involving senior government authorities, has drawn the public attention to issues regarding Internet security privacy. For almost a decade, there has been several research efforts towards designing and deploying open source, trustworthy and reliable electronic systems that ensure anonymity and privacy of users. These systems operate by concealing the true network identity of the communicating parties against eavesdropping adversaries of which TOR is an example of such a system. Clients that use the TOR network construct circuits (paths) which are utilised to route multiple network streams. A circuit is considered secure if there is one non-malicious router in the circuit. Such systems have served as anti-censorship and anti-surveillance tools. The implementation of TOR allows an individual to access the Dark Web, an area of the Internet that is said to be of a much larger magnitude than the Surface Web. The Dark Web which has earned a reputation as a sort of immense black market, associated with terrorist groups, child pornography, human trafficking, sale of drugs, conspiracies and hacking research, has received significant national and international press coverage. However, to date little or no research has been conducted on the illicit usage of the Dark Web and no research has been conducted in the use or misuse of the Dark Web in South Africa. There has not been any study which characterises the usage of a real deployed anonymity service. Observations obtained are presented by participating in the TOR network and the primary goal of this study is to elicit Dark Web traffic by South Africans. Past researchers undertook Dark Web crawling focusing only on specific web content such as explicitly focusing on child exploitation and terrorist activity. The experiment design of this study further builds on experiments conducted in previous studies. The deanonymisation methodology utilised in this study will allow for the detection of exit routing traffic and the logging of all Dark Web traffics areas omitted from the previous studies. This study does not confine the declassification of onion addresses to specific content types and aims to log all exit routing traffics, undertake a comprehensive declassification of websites visited by clients and obtain the Internet Protocol Addresses (IP) of these clients. The analysis of the sample results reveals that in the South African context, Dark Web traffic is mainly directed to social media websites. There are however causes for concerns as there are illicit activities occurring that include the sale of drugs, visiting of child pornographic websites, and the sale of weapons. Finally, the study presents evidence that exit routing traffic by the TOR node is limited to a large number of different countries some of which have serious Internet censorship laws.


2014 ◽  
Vol 13 (5) ◽  
pp. 963
Author(s):  
Burgert A. Senekal ◽  
Karlien Stemmet

The theory of complex systems has gained significant ground in recent years, and with it, complex network theory has become an essential approach to complex systems. This study follows international trends in examining the interlocking South African bank director network using social network analysis (SNA), which is shown to be a highly connected social network that has ties to many South African industries, including healthcare, mining, and education. The most highly connected directors and companies are identified, along with those that are most central to the network, and those that serve important bridging functions in facilitating network coherence. As this study is exploratory, numerous suggestions are also made for further research.


2014 ◽  
Vol 687-691 ◽  
pp. 2689-2692
Author(s):  
Zhao Li Wu

NAT (Network Address Translation) is the process of transforming one IP address in the datagram header into another. In practical applications, NAT is mainly used to realize the function of the access of private network to public network. The method of using a small number of public IP addresses representing a large quantity of private IP addresses will help to slow down the depletion of the IP address space available. As the Network Architecture is becoming more complex, the way, under such context, the NAT technology functions is of great importance. This dissertation will mainly analyze the special treatment of NAT in the following aspects like unified address management ,the priority level of address pool ,NAT mapping in PING Operation ,the treatment of ICMP err packet ,the NAT transformation of fragmented packet as well as the infinitive connection of multi –core products.


Author(s):  
Andrey Aleksandrov ◽  
Andrey Safronov

The article examines the concept, essence, specificity, structural elements of the Surface Network (from the English «Surface web») as well as so-called Deep Internet (from the English «Deep web»). The peculiarity of the use of the deep Internet in which the content is available only through connections created with the help of special software is discussed. The article describes the type of network separated from the rest of the public content forming the Darknet. It existed under the name of ARPANET (network of advanced research project agencies) before the civilian Internet known to us today has been separated from it. The creators of the Darknet haven’t foreseen all its applications. The paper lists software products used to connect to the Darknet. The purpose of special software products usage is to ensure its users’ maximum anonymity to complicate the tracking of their identity, IP-address as well as location in the network. The study reveals the main types of Darknet crimes and outlines ways to improve law enforcement activities to tackle these crimes. In addition, it identifies the problem of development and increasing use of the dark web for criminal purposes.


Author(s):  
Haoyu Ma ◽  
Jianqiu Cao ◽  
Bo Mi ◽  
Darong Huang ◽  
Yang Liu ◽  
...  

Author(s):  
Christina Johanna van Staden

Cooperative base groups (CBGs) is a technique used in contact education to develop cooperative learning skills. However, it was assumed that the tools currently available can be used for the establishment of CBGs in distance education. For the purpose of this research, a post graduate class in distance education (N=77) was divided in 11 CBGs with 7 members each with the task to assist one another in the completion of assignments, to motivate one another to submit assignments, and to support one another on academic and personal level during the year. The results shows that CBGs provided an effective method to facilitate the establishment of reciprocal relationships and therefore the development of positive interdependence, and that social network analysis provided an effective method to evaluate the development of positive interdependence both on group and class level. Unfortunately, the technique was prematurely cancelled when the author left the university. A possible correlation between positive interdependence and academic achievement needs to be further investigated.


2019 ◽  
Vol 10 (2) ◽  
pp. 83-96 ◽  
Author(s):  
Junaid Latief Shah ◽  
Heena Farooq Bhat ◽  
Asif Iqbal Khan

The Internet, since its genesis in 1970's, has already become a global broadcasting potential for information dissemination and a channel for information collaboration and an interface between disparate users and their systems, separated by large geographical locations. The rate of growth of interconnected devices has been on exponential scale from the last decade. As of now, more than 5 billion devices are accessing the Internet. The Internet Protocol Version 4 (IPv4) which is a three decade old standard internetworking protocol using 32-bit address, fails to cater such a large number of hosts. In February 2011, the Internet Assigned Numbers Authority (IANA), the nodal agency for IP address allocation exhausted the central pool of IPv4 addresses completely. This rapid depletion of IP addresses was inevitable as a large number of devices are getting connected to internet. Also, inefficient utilization and remiss planning of IP address space acted as catalyst in the process of depletion. NAT, CIDR and Subnetting only serve as short interim solutions provided by IPv4. Moreover, IPv4 fails to scale up and bridge the security enhancements required by the modern Internet today. The only feasible option lies in unabridged transition to IPv6. Internet Protocol Version 6 (IPv6) provides an address space of 2128 i.e. trillions of addresses, making the IP address space potentially inexhaustible. Thus, adopting IPv6 makes a paragon choice of replacement for IPv4. This article reviews the next generation internet protocol IPv6 and explicates the discussion over the need for migrating to IPv6. The article also presents technical as well as non-technical challenges related to migration and presents overall statistics regarding IPv6 adoption around the world.


Sign in / Sign up

Export Citation Format

Share Document