The Dark Web: An Exploration of the Shadowy Corners of the Internet

Year : 2024 | Volume :11 | Issue : 01 | Page : 1-5
By

B.M. Rajesh

Gobika S.

Lavanya Mahalakshmi B.

  1. Assistant Professor Department of Information Technology, Dr. NGP Arts and Science College, Coimbatore Tamil Nadu India
  2. Student Department of Information Technology, Dr. NGP Arts and Science College, Coimbatore Tamil Nadu India
  3. Student Department of Information Technology, Dr. NGP Arts and Science College, Coimbatore Tamil Nadu India

Abstract

The Internet consists of two main segments: the “Surface Web” and the “Deep Web”. The Surface Web encompasses all publicly accessible and indexed websites, while the Deep Web comprises unindexed pages. Within the Deep Web, the “dark web” constitutes the most substantial component, housing concealed content on the World Wide Web. To utilize it, specific settings, authentication, and software are needed. The Onion Router, or TOR, is a multi-layer encryption technique that protects user privacy and confidentiality. The majority of internet users believe that the deep web and the black web are interchangeable, according to several research and polls. This study discusses the present makeup of the Internet and that portion of the World Wide Web, which comprises the Surface Web, the Deep Web, and the Dark Web, in order to clarify this and examine the structure of the Internet. This sentence discusses distinctions between the deep web and the dark web, highlighting the advantages of using the TOR browser in the dark web and its practical applications.

Keywords: Dark web, deep web, encryption, TOR, anonymous, privacy, access

[This article belongs to Journal of Web Engineering & Technology(jowet)]

How to cite this article: B.M. Rajesh, Gobika S., Lavanya Mahalakshmi B.. The Dark Web: An Exploration of the Shadowy Corners of the Internet. Journal of Web Engineering & Technology. 2024; 11(01):1-5.
How to cite this URL: B.M. Rajesh, Gobika S., Lavanya Mahalakshmi B.. The Dark Web: An Exploration of the Shadowy Corners of the Internet. Journal of Web Engineering & Technology. 2024; 11(01):1-5. Available from: https://journals.stmjournals.com/jowet/article=2024/view=138441





References

  1. Hurlburt G. Shining light on the dark web. Computer. 2017 Apr 1; 50(04): 100–5.
  2. Bhushan B, Saxena S. The Dark Web: A Dive into the Darkest Side of the Internet. Proceedings of the International Conference on Innovative Computing & Communications (ICICC) 2020. 2020 May 12. http://dx.doi.org/10.2139/ssrn.3598902
  3. Henderson L. Tor & the Dark Art of Anonymity. USA: Createspace Independent Pub; 2015.
  4. Antonopoulos AM. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, United States, Inc.; 2014.
  5. Sinha P, Jha VK, Rai AK, Bhushan B. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In 2017 IEEE International Conference on Signal Processing and Communication (ICSPC). 2017 Jul 28; 288–293.
  6. Retzkin S. Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it. Packt Publishing Ltd, United Kingdom; 2018 Dec 26.
  7. Dalins J, Wilson C, Carman M. Criminal motivation on the dark web: A categorisation model for law enforcement. Digit Investig. 2018 Mar 1; 24: 62–71.
  8. Sharma M, Tandon A, Narayan S, Bhushan B. Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In 2017 IEEE 3rd International conference on advances in computing, communication & automation (ICACCA)(Fall). 2017 Sep 15; 1–5.
  9. Biswas R, Fidalgo E, Alegre E. Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. In 8th IET International Conference on Imaging for Crime Detection and Prevention (ICDP 2017). 2017 Dec 13; 7–12.
  10. Singh A, Sharma A, Sharma N, Kaushik I, Bhushan B. Taxonomy of attacks on web based applications. In 2019 IEEE 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). 2019 Jul 5; 1: 1231–1235.
  11. Lightfoot S, Pospisil F. Surveillance and privacy on the deep Web. ResearchGate, Berlin, Germany, Tech Rep. 2017 May 5.
  12. Senker C. Cybercrime and the DarkNet: Revealing the hidden underworld of the Internet. Arcturus Publishing; 2016 Sep 12.
  13. Diodati J, Winterdyk J. Dark Web: The Digital World of Fraud and Rouge Activities. In: Handbook of Research on Theory and Practice of Financial Crimes. IGI Global; 2021; 477–505.
  14. Gehl RW. Weaving the dark web: Legitimacy on Freenet, Tor, and I2P. MIT Press, United States; 2018 Aug 14.
  15. Davenport D. Anonymity on the Internet: why the price may be too high. Commun ACM. 2002 Apr 1; 45(4): 33–5.
  16. Martin J, Munksgaard R, Coomber R, Demant J, Barratt MJ. Selling drugs on darkweb cryptomarkets: differentiated pathways, risks and rewards. Br J Criminol. 2020 Apr 4; 60(3): 559–78.

Regular Issue Subscription Review Article
Volume 11
Issue 01
Received November 7, 2023
Accepted January 15, 2024
Published April 3, 2024