Dark Web: The Uniluminated Side of the World Wide Web
DOI:
https://doi.org/10.26438/ijcse/v7i1.296305Keywords:
Dark Web, Tor, I2P, Tor browser, Surface Web, Deep Web,, Silk RoadAbstract
The Dark Web is a part of the World Wide Web that exists on dark-net whose content is intentionally hidden, and cannot be accessed using normal search engines and require some specific browsers such as Tor browser. Dark web uses network such as Tor, I2P.While tor provides anonymity of users and make them untraceable, I2P provides anonymous hosting of websites. As the dark web hides the user’s identity and maintains secrecy, it can be used for legitimate purpose as well as illicit purpose. From smuggling of drugs and weapons to other illicit items, from hacking other’s information to using those for forging, from counterfeiting money to using crypto currency, dark web can play a number of roles in malicious activity. On the other hand, government and legitimate authority use dark web for military application such as online surveillance, sting operation and to track the malicious activities. This paper describes dark web emphasizing on how it is accessed, how the tor network (onion routing) and I2P work to hide user’s identity, how one can use TOR to access dark web, recent technological development, details on usage of dark web i.e. how different malicious activities are done using dark web, how the terrorist groups are using darkweb, how the legitimate authorities are using dark web to unveil some user’s identity and to stop the illicit activities and the future scope of dark web.
References
[1] K Finklea, "Dark Web", Congressional Research Service, 2017.
[2] https://www.torproject.org
[3] J. Kosinski, "Deepweb And Darknet- Police View", Archibald Reiss Days 2015, Belgrade, Vol.III, 2015.
[4] https://www.darpa.mil/program/memex
[5] 5.S.Ghosh,P.Porras,V.Yegneswaran,A.Gehani,A.Das,"ATOL- A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem”, The AAAI-17 Workshop onArtificial Intelligence for Cyber Security,WS-17-04.
[6] Nadine Cranenburgh, “what lurks on the dark web? New research uses ai to shine light”, 20-04-2018,https://www.createdigital.org.au/dark-web-new-research-ai/
[7] “Immunity on the Dark Web as a Result of Blockchain Technology”, https://codeburst.io/immunity-on-the-dark-web-as-a-result-of-blockchain-technology-6693eb087bdd
[8] Tarquln,” How to Access Notorious Dark web anonymously (10 step guide)”, DarkWebNews, 6 November 2018 ,https://darkwebnews.com/help-advice/access-dark-web/
[9] “how to acess notorious dark web anonymously”, https://www.wikihow.com/Access-the-Deep-Web
[10] G.Weimann,"Going Dark: Terrorism on the Dark Web", Studies in Conflict & Terrorism Vol.39,Issue.3,pp.195-206, 2016.
[11] V.Vilic,"Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of The Cyber Space", Balkan Social Science Review, Vol.10,pp. 7-25, 2017.
[12] M.Chertoff, T.Simon," The Impact of the Dark Web on Internet Governance and Cyber Security",Global Commision Of Internet Governence, paper series.(6), 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
