Dark Web Keyword Alert System for Early Detection Using Osint

Authors

Ms. Sowmiya. S M. Sc

Assistant Professor Department of Computer Science with Cyber Security Sri Ramakrishna College of Arts & Science Coimbatore (India)

Sanjay.S

Student Department of Computer Science with Cyber Security Sri Ramakrishna College of Arts & Science Coimbatore (India)

Shanmugasabarinathan.B

Student Department of Computer Science with Cyber Security Sri Ramakrishna College of Arts & Science Coimbatore (India)

Rhenius Solomon

Student Department of Computer Science with Cyber Security Sri Ramakrishna College of Arts & Science Coimbatore (India)

Ganeshkumar.N

Student Department of Computer Science with Cyber Security Sri Ramakrishna College of Arts & Science Coimbatore (India)

Article Information

DOI: 10.51244/IJRSI.2026.1303000023

Subject Category: Cybersecurity

Volume/Issue: 13/3 | Page No: 239-248

Publication Timeline

Submitted: 2026-03-05

Accepted: 2026-03-12

Published: 2026-03-25

Abstract

The rapid expansion of the digital underground has transformed the dark web into a critical sanctuary for cybercriminal activity, facilitating the illicit exchange of stolen credentials, leaked databases, and sensitive organizational intelligence. Traditional security frameworks often fail to monitor these hidden networks as they are not natively designed to navigate anonymous onion services. This research introduces the Dark Web Keyword Alert System (DWKAS), a proactive, open-source monitoring framework that automates the detection of data leaks using cost-effective tools. By integrating Tor-based anonymity with a Python-driven scanning engine, the system identifies high-risk indicators across four severity levels and delivers instantaneous alerts via the Telegram Bot API.
The proposed architecture utilizes a secure SOCKS5h proxy to eliminate IP and DNS leakage, ensuring the operational safety of the investigator. Experimental validation across fifty live hidden services demonstrated a detection accuracy of 92% and a low alert latency of approximately 2.2 seconds, confirming the system's practical feasibility. Furthermore, this paper addresses the critical ethical and legal implications of dark web monitoring and proposes the future integration of Natural Language Processing (NLP) to transition from static keyword matching to context-aware threat intelligence. The result is a scalable, reproducible, and containerized solution that significantly reduces the window of exposure for organizations facing modern cyber threats.

Keywords

Cybersecurity, Dark Web Monitoring, OSINT, Automated Alerting, Tor Network, Python, Threat Intelligence, Early Detection.

Downloads

References

1. R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," in Proceedings of the 13th USENIX Security Symposium, 2004, pp. 303–320. [Google Scholar] [Crossref]

2. B. J. Jansen and M. Mullen, "A Survey of Dark Web Crawling and Indexing Techniques," Journal of Electronic Commerce Research, vol. 22, no. 3, pp. 215–235, 2021. [Google Scholar] [Crossref]

3. The Tor Project, Tor Service Documentation and SOCKS5 Proxy Configuration, Tor Project Manual, 2024. [Google Scholar] [Crossref]

4. Python Software Foundation, Python Programming Language Documentation (v3.12), Python Software Foundation, 2024. [Google Scholar] [Crossref]

5. OWASP Foundation, "OWASP Top 10: Automated Threat Intelligence and OSINT Risks," OWASP Documentation, 2023. [Google Scholar] [Crossref]

6. L. Richardson, Beautiful Soup Documentation: Screen-Scraping with Python, Crummy Publications, 2023. [Google Scholar] [Crossref]

7. Pallets Projects, Flask Web Framework Documentation (v3.0), Pallets Projects, 2024. [Google Scholar] [Crossref]

8. Telegram Messenger LP, Telegram Bot API Documentation for Developers, Telegram API Manual, 2024. [Google Scholar] [Crossref]

9. H. Chen, W. Chung, J. Qin, and E. Reid, "Dark Web: Intelligence Gathering and Analysis," IEEE Intelligent Systems, vol. 25, no. 5, pp. 12–19, 2010. [Google Scholar] [Crossref]

10. IETF, SOCKS Protocol Version 5 (RFC 1928), Internet Engineering Task Force, 1996. [Google Scholar] [Crossref]

11. M. Jakobsson and S. Myers, Phishing and Countermeasures: Understanding Electronic Identity Theft, Wiley Publishing, 2007. [Google Scholar] [Crossref]

12. Requests Developers, Requests: HTTP for Humans – Proxy and SOCKS Support Documentation, Python Requests Documentation, 2024. [Google Scholar] [Crossref]

13. Kali Linux Team, Kali Linux Documentation: Penetration Testing and Security Auditing Environment, Offensive Security, 2024. [Google Scholar] [Crossref]

14. G. Weimann, "Terrorist Migration to the Dark Web," Studies in Conflict & Terrorism, vol. 39, no. 10, pp. 876–894, 2016. [Google Scholar] [Crossref]

15. SQLite Development Team, SQLite Database Engine Documentation and SQL Syntax, SQLite Documentation, 2024. [Google Scholar] [Crossref]

16. NIST, Framework for Improving Critical Infrastructure Cybersecurity, National Institute of Standards and Technology, Version 1.1, 2023. [Google Scholar] [Crossref]

17. Symantec Corporation, Internet Security Threat Report: The Rise of Dark Web Marketplaces, Symantec Enterprise, 2023. [Google Scholar] [Crossref]

18. A. Gupta and R. Kaushal, "A Survey on Email Spoofing and Phishing Detection Techniques," International Journal of Computer Applications, vol. 182, no. 1, 2019. [Google Scholar] [Crossref]

19. Oracle Corporation, Oracle VM VirtualBox User Manual and Virtualization Documentation, Oracle Documentation, 2024. [Google Scholar] [Crossref]

20. J. Brownlee, Machine Learning Mastery with Python, Machine Learning Mastery Publishing, 2016. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles