Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dark web threat information acquisition method

An acquisition method and darknet technology, applied in the field of Internet information, can solve problems such as the inability to accurately identify darknet traffic, and achieve the effects of overcoming dynamics and distribution, preventing information leakage and high concealment.

Active Publication Date: 2022-07-05
INFORMATION CENT OF CHINA NORTH IND GRP
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to address the defects of the existing technology, and to effectively solve the technical problem that dark network traffic cannot be accurately identified, and creatively propose a dark network threat information acquisition method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dark web threat information acquisition method
  • Dark web threat information acquisition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The method of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0019] like figure 1 As shown, a method for obtaining darknet threat information includes the following steps:

[0020] Step S1: Build a client to access the dark web, and monitor the interactive traffic of the dark web.

[0021] Specifically, step S1 includes the following steps:

[0022] Step S1.1: The production includes Tor (The Onion Router, onion routing), FreeNet (a completely distributed P2P anonymous publishing network), ZeroNet (zero network, a decentralized network) and I2P (an anonymous network in Various node containers, client-side containers and server-side containers including the framework for secure data transmission in the environment), and establish a large-scale darknet closed environment, conduct domain name collection, and discover isolated and unpublished nodes.

[0023] Step S1.2: Use the SHA1 algorithm to calculate t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a dark web threat information acquisition method, and belongs to the technical field of Internet information. According to the method, an extensible automatic access framework with concealment and a multi-dark web crawler engine capable of bypassing an anti-crawling strategy are provided, and the method is an anti-concealment technology capable of widely obtaining dark web bridge nodes and dark web websites. The method comprises the following steps: firstly, establishing a client access dark network, and monitoring dark network interaction flow; and then, the relay node is deployed in the dark network, and the flow flowing through the relay node is monitored. And finally, utilizing a distributed crawler to collect the address of the hidden server of the dark web. According to the method, an extensible multi-service dark network access framework is provided, automatic access of multiple dark network services is achieved, information leakage can be prevented, and the dynamic nature and the distribution of dark network bridge nodes are overcome. Meanwhile, the method obtains bridge nodes as comprehensive as possible, solves the problems of distribution and high concealment of the hidden service of the dark web, and obtains the domain names of the dark web website as wide as possible.

Description

technical field [0001] The invention relates to a darknet threat information acquisition technology, and belongs to the field of Internet information technology. [0002] technical background [0003] As countries around the world have strengthened the supervision and control of the bright net, the dark net with high anonymity and invisibility is subject to a large number of illegal elements. Therefore, researching darknet space resources and monitoring them in real time is of great significance to the security of the country and society. [0004] By detecting and analyzing the current services provided by the dark web space, the distribution of hidden resources of dark web nodes and websites, etc., and monitoring the criminal transaction information in the dark web in real time, the acquisition of important military and political threat intelligence and the security of the dark web space are realized. Situational analysis. Adopt active detection and passive collection rela...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408
Inventor 张弛胡晴余文豪
Owner INFORMATION CENT OF CHINA NORTH IND GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products