Dark Web
EOI: 10.11242/viva-tech.01.06.020
Citation
Prof. Neha Lodhe, Mayur Bhate, Rith Belwalkar, "Dark Web", VIVA-IJRI Volume 1, Issue 6, Article MCA_20, pp. 1-6, 2023. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.
Abstract
The main objective of Dark web is that it is the concealed content of the World Wide Web. It requires specialized software, authentication and some configuration to access. In order to demystify the same and provide a structural analysis of the Internet, this paper sheds light on the current composition of the Internet and the portion of the World Wide Web held by surface web, deep web and the dark web. It also discusses how the dark web is different from the deep web, mechanism of accessing the deep web, tor browser and the benefits of the dark web along with some of the real-life applications. .
Keywords
Access, Anonymous, Deep web, Encryption , Privacy, The dark web, TOR.
References
- Hurlburt, G. (2017). Shining Light on the Dark Web. Computer, 50(4), 100–105. doi: 10.1109/mc.2017.110
- Bradbury, D. (2019, January 6). Silk Road and Beyond: Bitcoin's Complex Relationship With the Dark Web.Retrieved from https://www.thebalance.com/what-is-a-dark-market- 391289 [3] A public policy perspective of the Dark Web. (n.d.). Retrieved from https://www.tandfonline.com/doi/full/10.1080/23738871.2017.1298643
- What is the Difference Between the Surface Web, the Deep Web, and the Dark Web? (2018, October 11).Retrieved from https://resources.infosecinstitute.com/what-is-the-difference-betweenthe-surface-web-the-deepweb-and-the-dark-web/#gref
- East, C. S. (2017). Demystifying the Dark Web. Itnow, 59(1), 16–17. doi: 10.1093/itnow/bwx007
- Rafter, D. (n.d.). Is the dark web illegal? Retrieved from https://us.norton.com/internetsecurity-privacy-is-thedark-webillegal.html
- Deep Web Search – A How-To Site. (n.d.). Retrieved from http://deep-web.org/how-to- research/deep-websearch-engines/
- Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. 2017 International Conference on Signal Processing and Communication (ICSPC). DOI: 10.1109/cspc.2017.8305855
- Chandler, N. (2013, December 23). How the Deep Web Works. Retrieved from https://computer.howstuffworks.com/internet/basics/how-the-deepweb-works1.html
- The Deep Web vs. The Dark Web. (2019, December 23). Retrieved from https://www.dictionary.com/e/darkweb/
- A public policy perspective of the Dark Web. (n.d.). Retrieved from https://www.tandfonline.com/doi/full/10.1080/23738871.2017.129864 3
- Dalins, J., Wilson, C., & Carman, M. (2018). Criminal motivation on the dark web: A categorisation model for law enforcement. Digital Investigation, 24, 62–71. doi: 10.1016/j.diin.2017.12.003
- A public policy perspective of the Dark Web. (n.d.). Retrieved from https://www.tandfonline.com/doi/full/10.1080/23738871.2017.1298643
- Sharma, M., Tandon, A., Narayan, S., & Bhushan, B. (2017). Classification and analysis of security attacks in WSNs and IEEE 802.15.4 standards : A survey. 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall). DOI: 10.1109/icaccaf.2017.8344727
- Biswas, R., Fidalgo, E., & Alegre, E. (2017). Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017). doi: 10.1049/ic.2017.0041
- Singh, A., Sharma, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/icicict46008.2019.8993264
- East, C. S. (2017). Demystifying the Dark Web. Itnow, 59(1), 16–17. doi: 10.1093/itnow/bwx007
- What's the Dark Web & How to Access It in 3 Easy Steps - 2020. (n.d.). Retrieved from https://www.vpnmentor.com/blog/whats-thedark-web-how-to-access-it-in-3-easy-steps/
- Bradbury, D. (2019, January 6). Silk Road and Beyond: Bitcoin's Complex Relationship With the Dark Web. Retrieved from https://www.thebalance.com/what-is-a-dark-market- 391289
- Alnabulsi, H., & Islam, R. (2018). Identification of Illegal Forum Activities Inside the Dark Net. 2018 International Conference on Machine Learning and Data Engineering (ICMLDE). doi: 10.1109/icmlde.2018.00015
- Sharma, A., Singh, A., Sharma, N., Kaushik, I., & Bhushan, B. (2019). Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/icicict46008.2019.8993141
- Bitcoin. (2020, April 3). Retrieved from https://en.wikipedia.org/wiki/Bitcoin
- Arora, D., Gautham, S., Gupta, H., & Bhushan, B. (2019). Blockchain-based Security Solutions to Preserve Data Privacy and Integrity. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/icccis48478.2019.8974503