Open Access   Article Go Back

Study Report of existing forensic tools and technologies to identify Darknet

Preeti S. Joshi1 , Dinesha H.A.2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 797-800, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.797800

Online published on Oct 31, 2018

Copyright © Preeti S. Joshi, Dinesha H.A. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Preeti S. Joshi, Dinesha H.A., “Study Report of existing forensic tools and technologies to identify Darknet,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.797-800, 2018.

MLA Style Citation: Preeti S. Joshi, Dinesha H.A. "Study Report of existing forensic tools and technologies to identify Darknet." International Journal of Computer Sciences and Engineering 6.10 (2018): 797-800.

APA Style Citation: Preeti S. Joshi, Dinesha H.A., (2018). Study Report of existing forensic tools and technologies to identify Darknet. International Journal of Computer Sciences and Engineering, 6(10), 797-800.

BibTex Style Citation:
@article{Joshi_2018,
author = {Preeti S. Joshi, Dinesha H.A.},
title = {Study Report of existing forensic tools and technologies to identify Darknet},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {797-800},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3103},
doi = {https://doi.org/10.26438/ijcse/v6i10.797800}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.797800}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3103
TI - Study Report of existing forensic tools and technologies to identify Darknet
T2 - International Journal of Computer Sciences and Engineering
AU - Preeti S. Joshi, Dinesha H.A.
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 797-800
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
486 299 downloads 226 downloads
  
  
           

Abstract

DarkNet is the portion of Internet that is intentionally kept hidden and is only accessible by special soft wares and non-standard communication protocols and ports. Accessing these portion is not illegal at all times, but these software make it possible to keep the user anonymous and preserve data privacy. Anonymous communication has gained popularity and is of much interest. Anonymity leads to compromising nonrepudiation and security goals. Apart from providing freedom of speech to user, anonymity also provides conducive environment to illegal activities and different kinds of cyber-attacks. Network surveillance and forensic investigation is required to reconstruct or collect evidence but becomes a challenge due to anonymity, encryption and newer ways of cyber-attack. Innovative methods and techniques are required for overcoming these challenges of DarkNet. Sniffing the network for information, traffic analysis, anomaly and intrusion detection are few techniques to find evidences. With a plethora of tools and techniques available for collecting, identifying, processing and analyzing data on the networks, we try to explore few tools for forensic investigation in the DarkNet.

Key-Words / Index Term

Darknet, Freenet, I2P, Tor, whonix

References

[1] Dr. Digvijaysinh Rathod,” Darknet forensic”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 6, Issue 4, July- August 2017
[2] Rhyme Upadhyaya, Aruna Jain, “Cyber Ethics and Cyber Crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet ”, Published in International Conference on Computing, Communication and Automation (ICCCA), pp.143-148 ,2016
[3] Afzaal Ali, Maria Khan, Muhammad Saddique , Umar Pirzada, Muhammad Zohaib, Imran Ahmad, Narayan Debnath “ TOR vs I2P: A Comparative Study”, Published in: 2016 IEEE International Conference on Industrial Technology (ICIT), pp.1748-1751, 2016
[4] Thorsten Ries, Andriy Panchenko, Radu State and Thomas Engel , “Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance”, AISC `11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116, 2011
[5] Roger Dingledine, Nick Mathewson, Paul Syverson,” Tor: The Second-Generation Onion Router”, 13th conference on USENIX Security Symposium - Volume 13, 2004
[6] Clarke I., Sandberg O., Wiley B., Hong T.W. (2001) Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath H. (eds) Designing Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 2009. Springer, Berlin, Heidelberg.
[7] Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor, “A Bird`s Eye View on the I2P Anonymous File-sharing Environment”,
Proceedings of the 6th International Conference on Network and System Security, pp.135-148, 2012.
[8] Whonix, www.whonix.org/wiki, 25-Aug- 2018
[9] Packet Sniffer-Fiddler, https://www.telerik.com/fiddle, 25-Aug- 2018
[10] Netminer Sniffer and Network Visualization tool, www.netminer.com, 25-Aug- 2018
[11] Wireshark and ethereal network protocol analyser toolkit,1st edition, elsevier,ISBN: 9781597490733
[12] Capsa Real time portable network anlalyser, Users Guide, 2018
[13] Netsnigg-ng as Network analyser, www.netsniff-ng.org, 20-Sep 2018
[14] M Roesch - Lisa , “ Snort: lightweight intrusion detection network”, Proceedings of LISA `99: 13th Systems Administration Conference, 1999
[15] Suricata IDS, www.suricata-ids.org, 25-Aug- 2018
[16] Bro IDS, www.bro.org/sphinx/intro, 25-Aug - 2018
[17] Security Onion IDS, www.securityonion.net, 25-Aug - 2018
[18] Openwips IPS, www.openwips-ng.org, 25-Aug - 2018
[19] Kismet IDS, www.kismetwireless.net/ 25-Aug - 2018
[20] NetDetecor IDS, www.niksun.com, 25-Aug - 2018
[21] Seong Soo Kim and A. L. Narasimha Reddy, “NetViewer: A Network Traffic Visualization and Analysis Tool” Texas A&M University, 19th Large Installation System Administration Conference (LISA ’05), 2005
[22] Network monitoring tool, www.manageengine.com/products/netflow, 25-Aug - 2018
[23] Elasticsearch, www.elastic.co/products/kibana 25-Aug - 2018