Methodology for Identification and Classifying of Cybercrime on Tor Network through the Use of Cryptocurrencies Based on Web Textual Contents



Título del documento: Methodology for Identification and Classifying of Cybercrime on Tor Network through the Use of Cryptocurrencies Based on Web Textual Contents
Revista: Computación y sistemas
Base de datos:
Número de sistema: 000560648
ISSN: 1405-5546
Autores: 1
2
3
Instituciones: 1Benemérita Universidad Autónoma de Puebla, Facultad de Ciencias de la Computación, México
2Benemérita Universidad Autónoma de Puebla, National Super-Computing Laboratory, México
3Universidade da Coruña, Computer Science and Information Technology, Galicia. España
Año:
Periodo: Ene-Mar
Volumen: 26
Número: 1
Paginación: 347-356
País: México
Idioma: Inglés
Resumen en inglés The Fourth Industrial Revolution has propelled global society into a new era of information and knowledge, transforming the economy and society of many countries. The global digitization process impacts more than half of the world population with internet access and the increase in the incidence of crimes in cyberspace, affecting the population mainly online fraud, crimes that attack vulnerable groups such as girls, boys and adolescents, as well as the diversity of cyberattacks with an impact on the availability, integrity and confidentiality of essential data and information systems of public, private and academic institutions. Most of these antisocial behaviors are published on the Deep Internet due to its anonymity, one of these being the TOR browser project (The Onion Router), in order to address this problem, a methodology was developed that allows the authorities in Mexico have a database that allows correlating data published on this network with the investigations they carry out derived from reports of cybercrimes to obtain lines of investigation based on the identification and classification of cybercrime, and using language engineering techniques and of knowledge as the methods of creation of ontologies of Ding, Y; Foo, S; recovery tool for large information files on websites such as wget, security measures for browsing the Deep Internet such as "Whonix Gateway", "Text Cleaning" techniques, extraction and classification features such as "Jaccard and Cosine Similarity Calculation", among other.
Keyword: Cybercrime,
Cryptocurrencies,
Fraud identification,
Web textual contents,
Detection tools
Texto completo: Texto completo (Ver HTML) Texto completo (Ver PDF)