Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain
Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critica...
Ausführliche Beschreibung
Autor*in: |
Gallo-Serpillo, Facundo [verfasserIn] Valls-Prieto, Javier [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2024 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Computers in human behavior - Amsterdam [u.a.] : Elsevier Science, 1985, 154 |
---|---|
Übergeordnetes Werk: |
volume:154 |
DOI / URN: |
10.1016/j.chb.2024.108137 |
---|
Katalog-ID: |
ELV067097448 |
---|
LEADER | 01000naa a22002652 4500 | ||
---|---|---|---|
001 | ELV067097448 | ||
003 | DE-627 | ||
005 | 20240218093022.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240218s2024 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.chb.2024.108137 |2 doi | |
035 | |a (DE-627)ELV067097448 | ||
035 | |a (ELSEVIER)S0747-5632(24)00004-9 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |a 150 |a 300 |q VZ |
100 | 1 | |a Gallo-Serpillo, Facundo |e verfasserin |0 (orcid)0000-0002-5189-1128 |4 aut | |
245 | 1 | 0 | |a Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain |
264 | 1 | |c 2024 | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. | ||
650 | 4 | |a CSEM | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Dark web | |
650 | 4 | |a Honeypot | |
650 | 4 | |a Geolocation | |
700 | 1 | |a Valls-Prieto, Javier |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Computers in human behavior |d Amsterdam [u.a.] : Elsevier Science, 1985 |g 154 |h Online-Ressource |w (DE-627)319508544 |w (DE-600)2001911-7 |w (DE-576)259271136 |x 0747-5632 |7 nnns |
773 | 1 | 8 | |g volume:154 |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2056 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a GBV_ILN_2110 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4334 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 154 |
author_variant |
f g s fgs j v p jvp |
---|---|
matchkey_str |
article:07475632:2024----::nlssfsmfedroteakeuigoepttgooae |
hierarchy_sort_str |
2024 |
publishDate |
2024 |
allfields |
10.1016/j.chb.2024.108137 doi (DE-627)ELV067097448 (ELSEVIER)S0747-5632(24)00004-9 DE-627 ger DE-627 rda eng 004 150 300 VZ Gallo-Serpillo, Facundo verfasserin (orcid)0000-0002-5189-1128 aut Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain 2024 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. CSEM Cybercrime Dark web Honeypot Geolocation Valls-Prieto, Javier verfasserin aut Enthalten in Computers in human behavior Amsterdam [u.a.] : Elsevier Science, 1985 154 Online-Ressource (DE-627)319508544 (DE-600)2001911-7 (DE-576)259271136 0747-5632 nnns volume:154 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 154 |
spelling |
10.1016/j.chb.2024.108137 doi (DE-627)ELV067097448 (ELSEVIER)S0747-5632(24)00004-9 DE-627 ger DE-627 rda eng 004 150 300 VZ Gallo-Serpillo, Facundo verfasserin (orcid)0000-0002-5189-1128 aut Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain 2024 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. CSEM Cybercrime Dark web Honeypot Geolocation Valls-Prieto, Javier verfasserin aut Enthalten in Computers in human behavior Amsterdam [u.a.] : Elsevier Science, 1985 154 Online-Ressource (DE-627)319508544 (DE-600)2001911-7 (DE-576)259271136 0747-5632 nnns volume:154 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 154 |
allfields_unstemmed |
10.1016/j.chb.2024.108137 doi (DE-627)ELV067097448 (ELSEVIER)S0747-5632(24)00004-9 DE-627 ger DE-627 rda eng 004 150 300 VZ Gallo-Serpillo, Facundo verfasserin (orcid)0000-0002-5189-1128 aut Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain 2024 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. CSEM Cybercrime Dark web Honeypot Geolocation Valls-Prieto, Javier verfasserin aut Enthalten in Computers in human behavior Amsterdam [u.a.] : Elsevier Science, 1985 154 Online-Ressource (DE-627)319508544 (DE-600)2001911-7 (DE-576)259271136 0747-5632 nnns volume:154 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 154 |
allfieldsGer |
10.1016/j.chb.2024.108137 doi (DE-627)ELV067097448 (ELSEVIER)S0747-5632(24)00004-9 DE-627 ger DE-627 rda eng 004 150 300 VZ Gallo-Serpillo, Facundo verfasserin (orcid)0000-0002-5189-1128 aut Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain 2024 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. CSEM Cybercrime Dark web Honeypot Geolocation Valls-Prieto, Javier verfasserin aut Enthalten in Computers in human behavior Amsterdam [u.a.] : Elsevier Science, 1985 154 Online-Ressource (DE-627)319508544 (DE-600)2001911-7 (DE-576)259271136 0747-5632 nnns volume:154 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 154 |
allfieldsSound |
10.1016/j.chb.2024.108137 doi (DE-627)ELV067097448 (ELSEVIER)S0747-5632(24)00004-9 DE-627 ger DE-627 rda eng 004 150 300 VZ Gallo-Serpillo, Facundo verfasserin (orcid)0000-0002-5189-1128 aut Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain 2024 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. CSEM Cybercrime Dark web Honeypot Geolocation Valls-Prieto, Javier verfasserin aut Enthalten in Computers in human behavior Amsterdam [u.a.] : Elsevier Science, 1985 154 Online-Ressource (DE-627)319508544 (DE-600)2001911-7 (DE-576)259271136 0747-5632 nnns volume:154 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 154 |
language |
English |
source |
Enthalten in Computers in human behavior 154 volume:154 |
sourceStr |
Enthalten in Computers in human behavior 154 volume:154 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
CSEM Cybercrime Dark web Honeypot Geolocation |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Computers in human behavior |
authorswithroles_txt_mv |
Gallo-Serpillo, Facundo @@aut@@ Valls-Prieto, Javier @@aut@@ |
publishDateDaySort_date |
2024-01-01T00:00:00Z |
hierarchy_top_id |
319508544 |
dewey-sort |
14 |
id |
ELV067097448 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">ELV067097448</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240218093022.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240218s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.chb.2024.108137</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV067097448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0747-5632(24)00004-9</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">150</subfield><subfield code="a">300</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gallo-Serpillo, Facundo</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-5189-1128</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2024</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CSEM</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Dark web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Honeypot</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geolocation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Valls-Prieto, Javier</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computers in human behavior</subfield><subfield code="d">Amsterdam [u.a.] : Elsevier Science, 1985</subfield><subfield code="g">154</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)319508544</subfield><subfield code="w">(DE-600)2001911-7</subfield><subfield code="w">(DE-576)259271136</subfield><subfield code="x">0747-5632</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:154</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">154</subfield></datafield></record></collection>
|
author |
Gallo-Serpillo, Facundo |
spellingShingle |
Gallo-Serpillo, Facundo ddc 004 misc CSEM misc Cybercrime misc Dark web misc Honeypot misc Geolocation Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain |
authorStr |
Gallo-Serpillo, Facundo |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)319508544 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science 150 - Psychology 300 - Social sciences |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
0747-5632 |
topic_title |
004 150 300 VZ Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain CSEM Cybercrime Dark web Honeypot Geolocation |
topic |
ddc 004 misc CSEM misc Cybercrime misc Dark web misc Honeypot misc Geolocation |
topic_unstemmed |
ddc 004 misc CSEM misc Cybercrime misc Dark web misc Honeypot misc Geolocation |
topic_browse |
ddc 004 misc CSEM misc Cybercrime misc Dark web misc Honeypot misc Geolocation |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Computers in human behavior |
hierarchy_parent_id |
319508544 |
dewey-tens |
000 - Computer science, knowledge & systems 150 - Psychology 300 - Social sciences, sociology & anthropology |
hierarchy_top_title |
Computers in human behavior |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)319508544 (DE-600)2001911-7 (DE-576)259271136 |
title |
Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain |
ctrlnum |
(DE-627)ELV067097448 (ELSEVIER)S0747-5632(24)00004-9 |
title_full |
Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain |
author_sort |
Gallo-Serpillo, Facundo |
journal |
Computers in human behavior |
journalStr |
Computers in human behavior |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works 100 - Philosophy & psychology 300 - Social sciences |
recordtype |
marc |
publishDateSort |
2024 |
contenttype_str_mv |
zzz |
author_browse |
Gallo-Serpillo, Facundo Valls-Prieto, Javier |
container_volume |
154 |
class |
004 150 300 VZ |
format_se |
Elektronische Aufsätze |
author-letter |
Gallo-Serpillo, Facundo |
doi_str_mv |
10.1016/j.chb.2024.108137 |
normlink |
(ORCID)0000-0002-5189-1128 |
normlink_prefix_str_mv |
(orcid)0000-0002-5189-1128 |
dewey-full |
004 150 300 |
author2-role |
verfasserin |
title_sort |
analysis of csem offenders on the dark web using honeypots to geolocate ip addresses from spain |
title_auth |
Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain |
abstract |
Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. |
abstractGer |
Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. |
abstract_unstemmed |
Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 |
title_short |
Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain |
remote_bool |
true |
author2 |
Valls-Prieto, Javier |
author2Str |
Valls-Prieto, Javier |
ppnlink |
319508544 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1016/j.chb.2024.108137 |
up_date |
2024-07-06T20:04:53.085Z |
_version_ |
1803861405818945536 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000naa a22002652 4500</leader><controlfield tag="001">ELV067097448</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240218093022.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240218s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.chb.2024.108137</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV067097448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0747-5632(24)00004-9</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="a">150</subfield><subfield code="a">300</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gallo-Serpillo, Facundo</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-5189-1128</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Analysis of CSEM offenders on the dark web using honeypots to geolocate IP addresses from Spain</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2024</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Gathering evidence in cybercrime is a complex process. Under this premise, it is very important to have cutting-edge methodologies that allow the observation of criminal phenomena on the Internet and protect the personal integrity of the investigator, especially when the content is extremely critical and is located in the so-called dark zone of the Internet (hereinafter Dark Web). This article develops a new research methodology in the field of cybercrime based on the use of honeypots, and its main objective is to evaluate the ability to de-anonymize users in the Tor network to collect geographic coordinates and demographic data on the Dark Web in order to obtain digital evidence related to minors sexual (CSEM) offenders. The information collected aims to map the consumption of CSEM through cartograms, with a particular focus on the Spanish territory. The outcomes demonstrate the ability of using honeypots to assess the prevalence of CSEM consumption on the Dark Web. Future improvements of the methodology will be discussed.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CSEM</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Dark web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Honeypot</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geolocation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Valls-Prieto, Javier</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Computers in human behavior</subfield><subfield code="d">Amsterdam [u.a.] : Elsevier Science, 1985</subfield><subfield code="g">154</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)319508544</subfield><subfield code="w">(DE-600)2001911-7</subfield><subfield code="w">(DE-576)259271136</subfield><subfield code="x">0747-5632</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:154</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">154</subfield></datafield></record></collection>
|
score |
7.3988304 |