Examining and Exposing the Darknet
Total Page:16
File Type:pdf, Size:1020Kb
Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Fall 2017 Examining and Exposing the Darknet Ton H. Don Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Information Security Commons, Management Information Systems Commons, Other Computer Sciences Commons, and the Technology and Innovation Commons Recommended Citation Don, Ton H., "Examining and Exposing the Darknet" (2017). Electronic Theses and Dissertations. 1664. https://digitalcommons.georgiasouthern.edu/etd/1664 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. EXAMING AND EXPOSING THE DARKNET by TON DON (Under the Direction of Hayden Wimmer) ABSTRACT This thesis consists of two studies; the first study is “Diving into the Darknet” and the second is “Exposing the Darknet on Mobile Devices.” The Darknet is a network of hidden sites and services which are built based on anonymity. In “Diving into the Darknet,” we applied different data science methods to establish the relationships between the data in the data set. This data set has information related to seller, drug types, and transactions. Additionally, we used Tableau to visualize the data set. For the second study, we took a digital forensics perspective of the Darknet. Orfox and Orbot, a Browser Bundle which is used to access the Darknet through mobile devices, were installed on a Galaxy Note 5 with Android 6.0.1. After the investigation, some theories of past studies were disproved by our method combined with E3: DS, a mobile digital forensics software package by Paraben. We believe that the combination of information from a user’s point of view and a technical perspective of digital forensics would bring the Darknet to light. Through this thesis, we hope that knowledge about the Darknet will be revealed and better understood. INDEX WORDS: Darknet, Mobile Digital Forensics, Tableau, Data Visualization. EXAMING AND EXPOSING THE DARKNET by TON DON B.S., Georgia Southern University, 2015 A Thesis Submitted to the Graduate Faculty of Georgia Southern University in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE STATESBORO, GEORGIA © 2017 TON DON All Rights Reserved 1 EXAMING AND EXPOSING THE DARKNET by TON DON Major Professor: Hayden Wimmer Committee: Lei Chen Weitian Tong Electronic Version Approved: December 2017 2 DEDICATION To my parents and my grandparents for all the help and support they have been giving me. 3 AKNOWLEDGEMENTS Without the help of many people, a thesis would not be completed. The author would like to acknowledge all the time and efforts provided by the professors. The author would like to give special thanks to all the help and guidance of Drs. Hayden Wimmer, Lei Chen, and Weitian Tong. 4 TABLE OF CONTENTS Page AKNOWLEDGEMENTS ............................................................................................................. 3 TABLE OF CONTENTS .............................................................................................................. 4 LIST OF FIGURES ....................................................................................................................... 6 LIST OF EQUATIONS ................................................................................................................ 8 LIST OF ABBREVIATIONS ....................................................................................................... 9 1 INTRODUCTION ........................................................................................................... 10 2 LITERATURE REVIEW ................................................................................................ 12 2.1 Crypto market ........................................................................................................ 12 2.2 Tableau .................................................................................................................. 20 2.3 Digital Forensics Background for Tor .................................................................. 21 3 DIVING INTO THE DARKNET .................................................................................... 27 3.1 INTRODUCTION ................................................................................................. 27 3.2 METHOD .............................................................................................................. 29 3.3 RESULTS.............................................................................................................. 32 3.3.1 Visualizing the Darknet ................................................................................ 32 3.3.2 Analyzing the Darknet with Data Science .................................................... 35 3.4 CONCLUSION ..................................................................................................... 39 4 EXPOSING THE DARKNET ON MOBILE DEVICES ................................................ 40 5 4.1 INTRODUCTION ................................................................................................. 40 4.2 METHOD .............................................................................................................. 41 4.3 RESULT ................................................................................................................ 43 4.3.1 Shopping ....................................................................................................... 43 4.3.2 Social Media ................................................................................................. 46 4.4 CONCLUSION ..................................................................................................... 48 5 CONCLUSIONS ............................................................................................................. 49 6 REFERENCES (use endnote or MS Word citation manager) ......................................... 50 6 LIST OF FIGURES Page Figure 2.2.1 How Tor Works [1]..................................................................................................25 Figure 3.2.1: Law of Proximity [2] ..............................................................................................31 Figure 3.2.2: Law of Similarity [2] .............................................................................................. 32 Figure 3.2.3: Relationship between messenger and receiver [3]..................................................32 Figure 3.3.1.1: Top 10 sellers based on ranking [4] .....................................................................35 Figure 3.3.1.2: Sellers’ countries of origin...................................................................................36 Figure 3.3.1.3: Transactions’ destinations ...................................................................................36 Figure 3.3.2.1: Residual tests .......................................................................................................38 Figure 3.3.2.3: CART Decision Tree ...........................................................................................39 Figure 4.2.1: File system of the mobile device. ...........................................................................45 Figure 4.3.1.1a: Information on Amazon log in page ..................................................................46 Figure 4.3.1.1b: User’s search history on Amazon ......................................................................46 Figure 4.3.1.1c: More user’s search history on Amazon .............................................................46 Figure 4.3.1.1d: Item user was interested in on Amazon .............................................................46 Figure 4.3.1.2a: eBay login page’s information ...........................................................................47 Figure 4.3.1.2.b: User’s search history on eBay ..........................................................................47 Figure 4.3.1.2.c: The last item searched on eBay by the user ......................................................47 Figure 4.3.2.1a: Facebook’s search query by the user .................................................................48 Figure 4.3.2.1b: Information about user’s search query ..............................................................48 7 Figure 4.3.2.1c: Last searched query by the user .........................................................................48 Figure 4.3.2.2a: User’s ID and handle shown on Twitter ............................................................49 Figure 4.3.2.2b: User’s searched query on Twitter ......................................................................49 Figure 4.3.2.2c: Another search query performed by the user .....................................................49 Figure 4.3.2.2d: More search query from the user .......................................................................49 Figure 4.3.2.2e: Last place the user visited ..................................................................................49 8 LIST OF EQUATIONS Page Formula 3.3.2.1: Linear Regression [5] .......................................................................................37