{"id":"https://openalex.org/W2968758005","doi":"https://doi.org/10.1145/3339252.3339273","title":"Characterizing the Redundancy of DarkWeb .onion Services","display_name":"Characterizing the Redundancy of DarkWeb .onion Services","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2968758005","doi":"https://doi.org/10.1145/3339252.3339273","mag":"2968758005"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3339273","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3339273","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064281200","display_name":"Pavlo Burda","orcid":"https://orcid.org/0000-0003-4554-5410"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Pavlo Burda","raw_affiliation_strings":["Eindhoven University of Technology"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012191790","display_name":"Coen Boot","orcid":null},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Coen Boot","raw_affiliation_strings":["Radboud University (NL)"],"affiliations":[{"raw_affiliation_string":"Radboud University (NL)","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047635330","display_name":"Luca Allodi","orcid":"https://orcid.org/0000-0003-1600-0868"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Luca Allodi","raw_affiliation_strings":["Eindhoven University of Technology"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064281200"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.8659,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.8102785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.8624615669250488},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6573822498321533},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5521385669708252},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5303034782409668},{"id":"https://openalex.org/keywords/phenomenon","display_name":"Phenomenon","score":0.5073816180229187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44416895508766174},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42871707677841187},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3639395833015442},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12196055054664612},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10734432935714722},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07478728890419006}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.8624615669250488},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6573822498321533},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5521385669708252},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5303034782409668},{"id":"https://openalex.org/C50335755","wikidata":"https://www.wikidata.org/wiki/Q483247","display_name":"Phenomenon","level":2,"score":0.5073816180229187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44416895508766174},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42871707677841187},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3639395833015442},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12196055054664612},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10734432935714722},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07478728890419006},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1145/3339252.3339273","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3339273","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/d317f87c-efed-4d39-b6ab-a73c185c6b01","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/d317f87c-efed-4d39-b6ab-a73c185c6b01","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Burda, P, Boot, C & Allodi, L 2019, Characterizing the redundancy of DarkWeb .onion services. in Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019., 19, ACM International Conference Proceeding Series, Association for Computing Machinery, Inc., New York, 14th International Conference on Availability, Reliability and Security, 26/08/19. https://doi.org/10.1145/3339252.3339273","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:913233","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=913233","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:913233","is_oa":false,"landing_page_url":"http://repository.tue.nl/913233","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.tue.nl:publications/d317f87c-efed-4d39-b6ab-a73c185c6b01","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85071722816&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Burda, P, Boot, C & Allodi, L 2019, Characterizing the redundancy of DarkWeb .onion services. in Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019., 19, ACM International Conference Proceeding Series, Association for Computing Machinery, Inc., New York, 14th International Conference on Availability, Reliability and Security, 26/08/19. https://doi.org/10.1145/3339252.3339273","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/d317f87c-efed-4d39-b6ab-a73c185c6b01","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/d317f87c-efed-4d39-b6ab-a73c185c6b01","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1855811457","https://openalex.org/W1972791208","https://openalex.org/W2061809273","https://openalex.org/W2101287943","https://openalex.org/W2350778671","https://openalex.org/W2552653689","https://openalex.org/W2652594876","https://openalex.org/W2744692361","https://openalex.org/W2751069419","https://openalex.org/W2763006672","https://openalex.org/W2766615649","https://openalex.org/W2798110387","https://openalex.org/W2893970496","https://openalex.org/W3144127399","https://openalex.org/W4236259340","https://openalex.org/W4256224324","https://openalex.org/W4299930775"],"related_works":["https://openalex.org/W4300450609","https://openalex.org/W4386931570","https://openalex.org/W2391010541","https://openalex.org/W2357367123","https://openalex.org/W4388930439","https://openalex.org/W2387276901","https://openalex.org/W2385953334","https://openalex.org/W2351303360","https://openalex.org/W3134118520","https://openalex.org/W2349223072"],"abstract_inverted_index":{"The":[0],"Darkweb":[1,63,83],"hosts":[2],"a":[3,22,66,75],"number":[4],"of":[5,21,41,53,81,104,133,140,149],"legal":[6],"and":[7,45,55,93,98,128,136],"illegal":[8],"services":[9,44,92,118],"that":[10,84],"are":[11],"hard":[12],"to":[13,16,123],"reach":[14],"due":[15],"the":[17,32,38,50,62,78,82,105,138,150],"lack,":[18],"by":[19,29],"design,":[20],"regular":[23],"'name":[24],"service'":[25],"as":[26,65,143,145],"those":[27,154],"operated":[28],"DNSs":[30],"on":[31,109],"clearnet.":[33],"This":[34],"difficulty,":[35],"together":[36],"with":[37],"continuous":[39],"appearance":[40,139],"decoy":[42],"mirror":[43],"replicated":[46],"domains,":[47],"severely":[48],"limits":[49],"investigation":[51],"capabilities":[52],"researchers":[54],"law":[56],"enforcement":[57],"agencies":[58],"interested":[59],"in":[60],"measuring":[61],"phenomenon":[64],"whole.":[67],"To":[68],"address":[69],"this":[70],"issue":[71],"we":[72,126],"developed":[73],"MASSDEAL,":[74],"tool":[76],"for":[77],"automated":[79],"exploration":[80],"automatically":[85],"learns":[86],"about":[87],"new":[88],"or":[89],"previous":[90],"unseen":[91],"measures":[94],"repeatedly":[95],"across":[96,101],"time":[97],"space":[99],"(i.e.":[100],"multiple":[102],"deployments":[103],"same":[106],"service).":[107],"Relying":[108],"data":[110],"collected":[111],"over":[112],"more":[113],"than":[114],"20":[115],"thousand":[116],"darkweb":[117],"sampled":[119],"from":[120],"September":[121],"2018":[122],"January":[124],"2019,":[125],"perform":[127],"report":[129],"an":[130,147],"extensive":[131],"analysis":[132],"service":[134],"redundancy":[135,152],"measure":[137],".onion":[141],"mirrors":[142],"well":[144],"providing":[146],"estimation":[148],"infrastructural":[151],"behind":[153],"systems.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
