Problem Statement

Web crawler for dark web which Detect child abuse content

Hash values are one type of image characteristic that are frequently used in the automated identification of child abuse pictures . However, the capacity to identify CSAI is constrained for electronic service providers and other parties without access to hash value databases. Furthermore, a significant portion of photos are not yet indexed in hash value databases due to the expansion of CSA content distribution. As a result, new detection criteria must be developed to enhance the identification of CSAI that is not hashed.

PS Number: PSCBS010

Domain Bucket: Cyber Security
Category: Software
Dataset : NA

To add to existing detection criteria for non-hashed CSAI, we seek to find trends in the locations and folder/file naming conventions of websites hosting and displaying CSAI.

Background of the Problem

Automated detection of child sexual abuse images (CSAI) often relies on image attributes, such as hash values. However, electronic service providers and others without access to hash value databases are limited in their ability to detect CSAI. Additionally, the increasing amount of CSA content being distributed means that a large percentage of images are not yet cataloged in hash value databases. Therefore, additional detection criteria need to be determined to improve identification of non-hashed CSAI.

Objective

We aim to identify patterns in the locations and folder/file naming practices of websites
hosting and displaying CSAI, to use as additional detection criteria for non-hashed CSAI.
Using a custom-designed web crawler and snowball sampling, we analyzed the locations and naming practices of 103 Surface Web websites hosting and/or displaying 8108 known CSAI
hash values

Summary

Remembering numerous passwords from various different sites can be difficult for a user. So to provide some flexibility we can provide users a graphical password authentication system where instead of creating a password a user has to select graphical objects in a particular order to keep it as their password.