Skip to main content
Top
Published in: Wireless Personal Communications 4/2020

28-01-2020

Dark Web: A Web of Crimes

Authors: Shubhdeep Kaur, Sukhchandan Randhawa

Published in: Wireless Personal Communications | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet plays an important role in our day to day life. It has become an integrated part of all daily activities or lifestyle. Dark Web is like an untraceable hidden layer of the Internet which is commonly used to store and access the confidential information. But there are number of incidents which reported the misuse of this platform for conducting the criminal and illegal activities in a hidden manner. In this paper, an overview of dark web and various browsers which are used to access dark web are presented. An insight into various aspects of Dark Web such as features, advantages, disadvantages and browsers are discussed. An overview of the different types of attacks, exploits and malwares is also presented. There are different types of criminal activities and incidents which take place over the Dark Web are discussed so that reader can become aware of such types of activities and can take appropriate preventive measures for these activities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chertoff, M. (2017). A public policy perspective of the Dark Web. Journal Cyber Policy,2(1), 26–38.CrossRef Chertoff, M. (2017). A public policy perspective of the Dark Web. Journal Cyber Policy,2(1), 26–38.CrossRef
3.
go back to reference Mirea, M., Wang, V., & Jung J. (2019). The not so dark side of the darknet: a qualitative study. Security Journal, 32, 102–118. CrossRef Mirea, M., Wang, V., & Jung J. (2019). The not so dark side of the darknet: a qualitative study. Security Journal, 32, 102–118. CrossRef
4.
go back to reference Mirea, M., Wang, V., & Jung, J. (2018). The not so dark side of the darknet: A qualitative study. Security Journal,32, 102–118.CrossRef Mirea, M., Wang, V., & Jung, J. (2018). The not so dark side of the darknet: A qualitative study. Security Journal,32, 102–118.CrossRef
5.
go back to reference Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence. Çalışkan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence.
12.
go back to reference Rudesill, D. S., Caverlee, J., & Sui, D. (2015). The deep web and the darknet: A look inside the internet’s massive black box. Ohio State Public Law Working Paper No. 314. Rudesill, D. S., Caverlee, J., & Sui, D. (2015). The deep web and the darknet: A look inside the internet’s massive black box. Ohio State Public Law Working Paper No. 314.
13.
go back to reference Naseem, I., Kashyap, A. K., & Mandloi, D. (2016). Exploring anonymous depths of invisible web and the digi-underworld. International Journal of Computer Applications,NCC(3), 21–25. Naseem, I., Kashyap, A. K., & Mandloi, D. (2016). Exploring anonymous depths of invisible web and the digi-underworld. International Journal of Computer Applications,NCC(3), 21–25.
14.
go back to reference Van Hout, M. C., & Bingham, T. (2013). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy,24(5), 385–391.CrossRef Van Hout, M. C., & Bingham, T. (2013). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy,24(5), 385–391.CrossRef
16.
go back to reference Lacson, W., & Jones, B. (2016). The 21st century Dark Net market: Lessons from the fall of silk road. International Journal of Cyber Criminology,10(1), 40–61. Lacson, W., & Jones, B. (2016). The 21st century Dark Net market: Lessons from the fall of silk road. International Journal of Cyber Criminology,10(1), 40–61.
17.
go back to reference Finklea, K. (2017) Dark web report published by Congressional Research Service. Finklea, K. (2017) Dark web  report published by Congressional Research Service.
19.
go back to reference Cambiaso, E., Vaccari, I., Patti, L., & Aiello, M. (2019). Darknet security : A categorization of attacks to the TOR network. In: Italian Conference on Cyber Security. Cambiaso, E., Vaccari, I., Patti, L., & Aiello, M. (2019). Darknet security : A categorization of attacks to the TOR network. In: Italian Conference on Cyber Security.
21.
go back to reference Nasr, M., Bahramali, A., & Houmansadr, A. (2018) “DeepCorr : Strong flow correlation attacks on tor using deep learning”. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1962–1976). Nasr, M., Bahramali, A., & Houmansadr, A. (2018) “DeepCorr : Strong flow correlation attacks on tor using deep learning”. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1962–1976).
24.
go back to reference Schäfer, M., Fuchs, M., & Engel, M. (2019). BlackWidow : Monitoring the dark web for cyber security information. In: Proceedings of the 11th international conference on cyber conflict (CyCon), 1–21. Schäfer, M., Fuchs, M., & Engel, M. (2019). BlackWidow : Monitoring the dark web for cyber security information. In: Proceedings of the 11th international conference on cyber conflict (CyCon), 1–21.  
25.
go back to reference Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet Governance and cyber security" Global Commission on Internet Governance. Paper Series No. 6. Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet Governance and cyber security" Global Commission on Internet Governance. Paper Series No. 6.
Metadata
Title
Dark Web: A Web of Crimes
Authors
Shubhdeep Kaur
Sukhchandan Randhawa
Publication date
28-01-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07143-2

Other articles of this Issue 4/2020

Wireless Personal Communications 4/2020 Go to the issue