Study Report of existing forensic tools and technologies to identify Darknet

Authors

  • Joshi PS Department of Information Technology, Marathwada MitraMandal’s College of Engineering, SPPU, Pune, India
  • Dinesha H.A Department of Computer Science and Engineering, Jain College of Engineering, VTU, Belagavi, India

DOI:

https://doi.org/10.26438/ijcse/v6i10.797800

Keywords:

Darknet, Freenet, I2P, Tor,, whonix

Abstract

DarkNet is the portion of Internet that is intentionally kept hidden and is only accessible by special soft wares and non-standard communication protocols and ports. Accessing these portion is not illegal at all times, but these software make it possible to keep the user anonymous and preserve data privacy. Anonymous communication has gained popularity and is of much interest. Anonymity leads to compromising nonrepudiation and security goals. Apart from providing freedom of speech to user, anonymity also provides conducive environment to illegal activities and different kinds of cyber-attacks. Network surveillance and forensic investigation is required to reconstruct or collect evidence but becomes a challenge due to anonymity, encryption and newer ways of cyber-attack. Innovative methods and techniques are required for overcoming these challenges of DarkNet. Sniffing the network for information, traffic analysis, anomaly and intrusion detection are few techniques to find evidences. With a plethora of tools and techniques available for collecting, identifying, processing and analyzing data on the networks, we try to explore few tools for forensic investigation in the DarkNet

References

[1] Dr. Digvijaysinh Rathod,” Darknet forensic”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 6, Issue 4, July- August 2017

[2] Rhyme Upadhyaya, Aruna Jain, “Cyber Ethics and Cyber Crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet ”, Published in International Conference on Computing, Communication and Automation (ICCCA), pp.143-148 ,2016

[3] Afzaal Ali, Maria Khan, Muhammad Saddique , Umar Pirzada, Muhammad Zohaib, Imran Ahmad, Narayan Debnath “ TOR vs I2P: A Comparative Study”, Published in: 2016 IEEE International Conference on Industrial Technology (ICIT), pp.1748-1751, 2016

[4] Thorsten Ries, Andriy Panchenko, Radu State and Thomas Engel , “Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance”, AISC `11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116, 2011

[5] Roger Dingledine, Nick Mathewson, Paul Syverson,” Tor: The Second-Generation Onion Router”, 13th conference on USENIX Security Symposium - Volume 13, 2004

[6] Clarke I., Sandberg O., Wiley B., Hong T.W. (2001) Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath H. (eds) Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 2009. Springer, Berlin, Heidelberg.

[7] Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor, “A Bird`s Eye View on the I2P Anonymous File-sharing Environment”,

Proceedings of the 6th International Conference on Network and System Security, pp.135-148, 2012.

[8] Whonix, www.whonix.org/wiki, 25-Aug- 2018

[9] Packet Sniffer-Fiddler, https://www.telerik.com/fiddle, 25-Aug- 2018

[10] Netminer Sniffer and Network Visualization tool, www.netminer.com, 25-Aug- 2018

[11] Wireshark and ethereal network protocol analyser toolkit,1st edition, elsevier,ISBN: 9781597490733

[12] Capsa Real time portable network anlalyser, Users Guide, 2018

[13] Netsnigg-ng as Network analyser, www.netsniff-ng.org, 20-Sep 2018

[14] M Roesch - Lisa , “ Snort: lightweight intrusion detection network”, Proceedings of LISA `99: 13th Systems Administration Conference, 1999

[15] Suricata IDS, www.suricata-ids.org, 25-Aug- 2018

[16] Bro IDS, www.bro.org/sphinx/intro, 25-Aug - 2018

[17] Security Onion IDS, www.securityonion.net, 25-Aug - 2018

[18] Openwips IPS, www.openwips-ng.org, 25-Aug - 2018

[19] Kismet IDS, www.kismetwireless.net/ 25-Aug - 2018

[20] NetDetecor IDS, www.niksun.com, 25-Aug - 2018

[21] Seong Soo Kim and A. L. Narasimha Reddy, “NetViewer: A Network Traffic Visualization and Analysis Tool” Texas A&M University, 19th Large Installation System Administration Conference (LISA ’05), 2005

[22] Network monitoring tool, www.manageengine.com/products/netflow, 25-Aug - 2018

[23] Elasticsearch, www.elastic.co/products/kibana 25-Aug - 2018

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.797800
Published: 2025-11-17

How to Cite

[1]
P. S. Joshi and D. H. Dinesha, “Study Report of existing forensic tools and technologies to identify Darknet”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 797–800, Nov. 2025.