{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:56:04Z","timestamp":1775278564794,"version":"3.50.1"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T00:00:00Z","timestamp":1500854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"IANCIS, an EU ISEC project that involves IAC-CNR, Expert System"},{"name":"Italian \u201dArma dei Carabinieri\u201e"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2017,11,30]]},"abstract":"<jats:p>The exploration and analysis of Web graphs has flourished in the recent past, producing a large number of relevant and interesting research results. However, the unique characteristics of the Tor network limit the applicability of standard techniques and demand for specific algorithms to explore and analyze it. The attention of the research community has focused on assessing the security of the Tor infrastructure (i.e., its ability to actually provide the intended level of anonymity) and on discussing what Tor is currently being used for. Since there are no foolproof techniques for automatically discovering Tor hidden services, little or no information is available about the topology of the Tor Web graph. Even less is known on the relationship between content similarity and topological structure. The present article aims at addressing such lack of information. Among its contributions: a study on automatic Tor Web exploration\/data collection approaches; the adoption of novel representative metrics for evaluating Tor data; a novel in-depth analysis of the hidden services graph; a rich correlation analysis of hidden services\u2019 semantics and topology. Finally, a broad interesting set of novel insights\/considerations over the Tor Web organization and content are provided.<\/jats:p>","DOI":"10.1145\/3008662","type":"journal-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T12:52:34Z","timestamp":1500900754000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Exploring and Analyzing the Tor Hidden Services Graph"],"prefix":"10.1145","volume":"11","author":[{"given":"Massimo","family":"Bernaschi","sequence":"first","affiliation":[{"name":"IAC-CNR, Rome, Italy"}]},{"given":"Alessandro","family":"Celestini","sequence":"additional","affiliation":[{"name":"IAC-CNR, Rome, Italy"}]},{"given":"Stefano","family":"Guarino","sequence":"additional","affiliation":[{"name":"IAC-CNR, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0723-7847","authenticated-orcid":false,"given":"Flavio","family":"Lombardi","sequence":"additional","affiliation":[{"name":"IAC-CNR, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,7,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714627"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1360-0443.2011.03709.x"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET\u201911)","author":"Bauer Kevin","year":"2011"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903153"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577304"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988752"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2007.04.002"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11527954_16"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0204-8"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063747"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1841909.1841913"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/592642.592645"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","article-title":"On random graphs","volume":"6","author":"Erd\u0151s Paul","year":"1959","journal-title":"Publicat. Mathemat. Debrec."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.07.007"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.989932"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953146"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433495"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2011.646176"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2372336.2372347"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 19th Symposium on Network and Distributed System Security (NDSS\u201912)","author":"Jansen Rob","year":"2012"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48686-0_1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/360402.360406"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6515-8_13"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892065"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_5"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2015.0121"},{"key":"e_1_2_1_32_1","volume-title":"Torflow: Tor network analysis.","author":"Perry Mike","year":"2009"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517327.2442521"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.40"},{"key":"e_1_2_1_35_1","unstructured":"Robin Snader et al. 2008. A Tune-up for Tor: Improving Security and Performance in the Tor Network. Retrieved from https:\/\/www.internetsociety.org\/doc\/tune-tor-improving-security-and-per formance-tor-network-paper.  Robin Snader et al. 2008. A Tune-up for Tor: Improving Security and Performance in the Tor Network. Retrieved from https:\/\/www.internetsociety.org\/doc\/tune-tor-improving-security-and-per formance-tor-network-paper."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831146"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.40"},{"key":"e_1_2_1_38_1","volume-title":"Algorithms and heuristics for scalable betweenness centrality computation on multi-GPU systems. CoRR abs\/1602.00963","author":"Vella Flavio","year":"2016"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3008662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3008662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:21Z","timestamp":1750217781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3008662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,24]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11,30]]}},"alternative-id":["10.1145\/3008662"],"URL":"https:\/\/doi.org\/10.1145\/3008662","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,24]]},"assertion":[{"value":"2016-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}