Open Access   Article Go Back

Dark Web: The Uniluminated Side of the World Wide Web

Asoke Nath1 , Romita Mondal2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 296-305, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.296305

Online published on Jan 31, 2019

Copyright © Asoke Nath, Romita Mondal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Asoke Nath, Romita Mondal, “Dark Web: The Uniluminated Side of the World Wide Web,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.296-305, 2019.

MLA Style Citation: Asoke Nath, Romita Mondal "Dark Web: The Uniluminated Side of the World Wide Web." International Journal of Computer Sciences and Engineering 7.1 (2019): 296-305.

APA Style Citation: Asoke Nath, Romita Mondal, (2019). Dark Web: The Uniluminated Side of the World Wide Web. International Journal of Computer Sciences and Engineering, 7(1), 296-305.

BibTex Style Citation:
@article{Nath_2019,
author = { Asoke Nath, Romita Mondal},
title = {Dark Web: The Uniluminated Side of the World Wide Web},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {296-305},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3501},
doi = {https://doi.org/10.26438/ijcse/v7i1.296305}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.296305}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3501
TI - Dark Web: The Uniluminated Side of the World Wide Web
T2 - International Journal of Computer Sciences and Engineering
AU - Asoke Nath, Romita Mondal
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 296-305
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
719 422 downloads 179 downloads
  
  
           

Abstract

The Dark Web is a part of the World Wide Web that exists on dark-net whose content is intentionally hidden, and cannot be accessed using normal search engines and require some specific browsers such as Tor browser. Dark web uses network such as Tor, I2P.While tor provides anonymity of users and make them untraceable, I2P provides anonymous hosting of websites. As the dark web hides the user’s identity and maintains secrecy, it can be used for legitimate purpose as well as illicit purpose. From smuggling of drugs and weapons to other illicit items, from hacking other’s information to using those for forging, from counterfeiting money to using crypto currency, dark web can play a number of roles in malicious activity. On the other hand, government and legitimate authority use dark web for military application such as online surveillance, sting operation and to track the malicious activities. This paper describes dark web emphasizing on how it is accessed, how the tor network (onion routing) and I2P work to hide user’s identity, how one can use TOR to access dark web, recent technological development, details on usage of dark web i.e. how different malicious activities are done using dark web, how the terrorist groups are using darkweb, how the legitimate authorities are using dark web to unveil some user’s identity and to stop the illicit activities and the future scope of dark web.

Key-Words / Index Term

Dark Web, Tor, I2P, Tor browser, Surface Web, Deep Web, Silk Road

References

[1] K Finklea, "Dark Web", Congressional Research Service, 2017.
[2] https://www.torproject.org
[3] J. Kosinski, "Deepweb And Darknet- Police View", Archibald Reiss Days 2015, Belgrade, Vol.III, 2015.
[4] https://www.darpa.mil/program/memex
[5] 5.S.Ghosh,P.Porras,V.Yegneswaran,A.Gehani,A.Das,"ATOL- A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem”, The AAAI-17 Workshop onArtificial Intelligence for Cyber Security,WS-17-04.
[6] Nadine Cranenburgh, “what lurks on the dark web? New research uses ai to shine light”, 20-04-2018,https://www.createdigital.org.au/dark-web-new-research-ai/
[7] “Immunity on the Dark Web as a Result of Blockchain Technology”, https://codeburst.io/immunity-on-the-dark-web-as-a-result-of-blockchain-technology-6693eb087bdd
[8] Tarquln,” How to Access Notorious Dark web anonymously (10 step guide)”, DarkWebNews, 6 November 2018 ,https://darkwebnews.com/help-advice/access-dark-web/
[9] “how to acess notorious dark web anonymously”, https://www.wikihow.com/Access-the-Deep-Web
[10] G.Weimann,"Going Dark: Terrorism on the Dark Web", Studies in Conflict & Terrorism Vol.39,Issue.3,pp.195-206, 2016.
[11] V.Vilic,"Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of The Cyber Space", Balkan Social Science Review, Vol.10,pp. 7-25, 2017.
[12] M.Chertoff, T.Simon," The Impact of the Dark Web on Internet Governance and Cyber Security",Global Commision Of Internet Governence, paper series.(6), 2015.