Dark Web



EOI: 10.11242/viva-tech.01.05.001

Download Full Text here



Citation

Prof. Neha Lodhe, Mayur Bhate, Rith Belwalkar, "Dark Web", VIVA-IJRI Volume 1, Issue 6, Article MCA_20, pp. 1-6, 2023. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

The main objective of Dark web is that it is the concealed content of the World Wide Web. It requires specialized software, authentication and some configuration to access. In order to demystify the same and provide a structural analysis of the Internet, this paper sheds light on the current composition of the Internet and the portion of the World Wide Web held by surface web, deep web and the dark web. It also discusses how the dark web is different from the deep web, mechanism of accessing the deep web, tor browser and the benefits of the dark web along with some of the real-life applications. .

Keywords

Access, Anonymous, Deep web, Encryption , Privacy, The dark web, TOR.

References

  1. Hurlburt, G. (2017). Shining Light on the Dark Web. Computer, 50(4), 100–105. doi: 10.1109/mc.2017.110
  2. Bradbury, D. (2019, January 6). Silk Road and Beyond: Bitcoin's Complex Relationship With the Dark Web.Retrieved from https://www.thebalance.com/what-is-a-dark-market- 391289 [3] A public policy perspective of the Dark Web. (n.d.). Retrieved from https://www.tandfonline.com/doi/full/10.1080/23738871.2017.1298643
  3. What is the Difference Between the Surface Web, the Deep Web, and the Dark Web? (2018, October 11).Retrieved from https://resources.infosecinstitute.com/what-is-the-difference-betweenthe-surface-web-the-deepweb-and-the-dark-web/#gref
  4. East, C. S. (2017). Demystifying the Dark Web. Itnow, 59(1), 16–17. doi: 10.1093/itnow/bwx007
  5. Rafter, D. (n.d.). Is the dark web illegal? Retrieved from https://us.norton.com/internetsecurity-privacy-is-thedark-webillegal.html
  6. Deep Web Search – A How-To Site. (n.d.). Retrieved from http://deep-web.org/how-to- research/deep-websearch-engines/
  7. Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. 2017 International Conference on Signal Processing and Communication (ICSPC). DOI: 10.1109/cspc.2017.8305855
  8. Chandler, N. (2013, December 23). How the Deep Web Works. Retrieved from https://computer.howstuffworks.com/internet/basics/how-the-deepweb-works1.html
  9. The Deep Web vs. The Dark Web. (2019, December 23). Retrieved from https://www.dictionary.com/e/darkweb/
  10. A public policy perspective of the Dark Web. (n.d.). Retrieved from https://www.tandfonline.com/doi/full/10.1080/23738871.2017.129864 3
  11. Dalins, J., Wilson, C., & Carman, M. (2018). Criminal motivation on the dark web: A categorisation model for law enforcement. Digital Investigation, 24, 62–71. doi: 10.1016/j.diin.2017.12.003
  12. A public policy perspective of the Dark Web. (n.d.). Retrieved from https://www.tandfonline.com/doi/full/10.1080/23738871.2017.1298643
  13. Sharma, M., Tandon, A., Narayan, S., & Bhushan, B. (2017). Classification and analysis of security attacks in WSNs and IEEE 802.15.4 standards : A survey. 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall). DOI: 10.1109/icaccaf.2017.8344727
  14. Biswas, R., Fidalgo, E., & Alegre, E. (2017). Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017). doi: 10.1049/ic.2017.0041
  15. Singh, A., Sharma, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/icicict46008.2019.8993264
  16. East, C. S. (2017). Demystifying the Dark Web. Itnow, 59(1), 16–17. doi: 10.1093/itnow/bwx007
  17. What's the Dark Web & How to Access It in 3 Easy Steps - 2020. (n.d.). Retrieved from https://www.vpnmentor.com/blog/whats-thedark-web-how-to-access-it-in-3-easy-steps/
  18. Bradbury, D. (2019, January 6). Silk Road and Beyond: Bitcoin's Complex Relationship With the Dark Web. Retrieved from https://www.thebalance.com/what-is-a-dark-market- 391289
  19. Alnabulsi, H., & Islam, R. (2018). Identification of Illegal Forum Activities Inside the Dark Net. 2018 International Conference on Machine Learning and Data Engineering (ICMLDE). doi: 10.1109/icmlde.2018.00015
  20. Sharma, A., Singh, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/icicict46008.2019.8993141
  21. Bitcoin. (2020, April 3). Retrieved from https://en.wikipedia.org/wiki/Bitcoin
  22. Arora, D., Gautham, S., Gupta, H., & Bhushan, B. (2019). Blockchain-based Security Solutions to Preserve Data Privacy and Integrity. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974503