{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:17:05Z","timestamp":1759133825940,"version":"3.37.3"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>The dark web is a concealed portion of the Internet that can only be accessed through specialized software. Although multiple dark web technologies exist, with a common trait of using encryption to enforce anonymity, the Tor network remains the most prominent dark web network. To visit websites on the network, the user must use a heavily modified Firefox browser. The use of encryption to achieve anonymity poses a significant challenge for law enforcement that wishes to monitor users and content for illicit activity. This study examines Tor by focusing on the network structures created between websites via hyperlinks. Examining hyperlinks can provide insight into how virtual communities form on a network. We explore traditional social disorganization principles as a basis to draw comparisons between these virtual communities and real-life crime-prone neighborhoods. Automated data collection techniques were used to leverage the interconnected nature of domains on Tor. Using social network analysis, website hyperlinks are examined and core sites are identified. The analysis shows that these core sites form a significant portion of all connections made on the network with a density of 0.132. This core serves a critical function and has implications for detecting how users connect on Tor.<\/jats:p>","DOI":"10.1155\/2018\/4231326","type":"journal-article","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T19:31:22Z","timestamp":1525894282000},"page":"1-12","source":"Crossref","is-referenced-by-count":18,"title":["Uncovering Tor: An Examination of the Network Structure"],"prefix":"10.1155","volume":"2018","author":[{"given":"Bryan","family":"Monk","sequence":"first","affiliation":[{"name":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University, Burnaby, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2784-2526","authenticated-orcid":true,"given":"Julianna","family":"Mitchell","sequence":"additional","affiliation":[{"name":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University, Burnaby, BC, Canada"}]},{"given":"Richard","family":"Frank","sequence":"additional","affiliation":[{"name":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University, Burnaby, BC, Canada"}]},{"given":"Garth","family":"Davies","sequence":"additional","affiliation":[{"name":"International CyberCrime Research Center (ICCRC), School of Criminology, Simon Fraser University, Burnaby, BC, Canada"}]}],"member":"311","reference":[{"key":"2","first-page":"4","volume":"12","year":"2009","journal-title":"Computer Fraud & Security"},{"journal-title":"The Guardian","year":"2013","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2016.04.010"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.031"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2510125"},{"year":"2000","key":"13"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6852094"},{"year":"1942","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2016.1142085"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-016-9644-4"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.16997\/wpcc.206"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/dir.10006"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1086\/229068"},{"key":"17","first-page":"119","volume":"338","year":"1984","journal-title":"Annals of the American Academy of Political and Social Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1177\/0022427885022001002"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2001.tb00924.x"},{"year":"1978","key":"22"},{"first-page":"1","volume-title":"Key issues in the social ecology of crime","year":"1986","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.2747\/0272-3638.24.7.582"},{"issue":"3","key":"25","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1111\/j.1745-9125.2011.00241.x","volume":"49","year":"2011","journal-title":"Criminology"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1177\/0022427803256238"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0503-60"},{"key":"29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2202\/1944-2866.1173","volume":"3","year":"2011","journal-title":"Policy and Internet"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01285-8_11"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"volume-title":"Vulnerabilities in online child pornography networks","year":"2015","key":"34"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1088\/2058-7058\/14\/7\/32"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"year":"2004","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.045"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.10.007"},{"volume-title":"Assessing the core membership of a youth gang from its co-offending network","year":"2014","series-title":"Criminology and Justice Series","key":"40"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1038\/35036627"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/s0378-8733(99)00019-2"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/1400181.1400198"},{"issue":"1","key":"45","first-page":"61","volume":"1","year":"1967","journal-title":"Psychology Today"},{"first-page":"443","volume-title":"The Small World Web","year":"1999","key":"46"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/s0378-4371(00)00018-2"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2010.06.004"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/4231326.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/4231326.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/4231326.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T19:31:24Z","timestamp":1525894284000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/4231326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":40,"alternative-id":["4231326","4231326"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4231326","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}