Open Access Open Access  Restricted Access Subscription or Fee Access

Anonymous Is My Name -A Survey Paper on DarkWeb

B. R. Kavya, G. R. Vaishnavi, N. Sushmitha

Abstract


In the current world every transaction is online. In order to make the transactions and operations easier, technology and internet is used in every walk of life. The content which we are accessing through popular web browsers are only in the surface level of web. But the web space which was built and used for communication and maintenance of confidential information is now being a place where brutal and illegal activities are happening on a large scale, the place which is called –the dark web. It is portrayed as a den of mysterious and illegal activity. This paper illustrates the survey on the whereabouts of the dark web, its current usage in various activities, the technique of anonymity and a few relevant case studies.


Keywords


The Onion Router, Anonymous, Illegal, Deep Web, Dark Web.

Full Text:

PDF

References


M. Splitters, F. Klaver, G. Koot and M. Van Staalduinen,"Authorship Analysis on Dark Marketplace Forums," in proceeding of Intelligence and Security Informatics Conference (EISIC), Manchester, 2015.

K. Bharat and A. Broder , "A technique for measuring the relative size and overlap of public Web search engines," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 379-388, 1998.

M. Bergman, "White Paper: The Deep Web: Surfacing Hidden Value," The Journal of Electronic, vol. 7, no. 1, 2001.

M. Eddy, "Inside the Dark Web," 04 02 2015. Available:http://uk.pcmag.com/security/39461/guide/ inside-thedark-web.

M. Egan, "What is the Dark Web? How to access the Dark Web. What's the difference between the Dark Web and the Deep Web?," 2016 06 28. [Online]. Available:http://www.pcadvisor.co.uk/how- to/internet/what-isdark-web-how-access-dark-web- deep-jocbeautfiulpeople-3593569/.

H. Oman, "Security Technology Progress: The 37th IEEE-AESS Carnahan Conference, Taiwan," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no.2, pp. 35-40, 2004.

H. Chen, "The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the„ Dark Web‟ and Terrorism Research Resources," 08 2003. [Online]. Available http://www.slideshare.net/suyu22/the- terrorismknowledge-portal-advanced-methodologies-forcollecting-and-analyzing-information-from-the- darkweb-and-terrorism-research-resources.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.