The Dark Web: Hidden Access to Internet Today

The Dark Web: Hidden Access to Internet Today

Ramanujam Elangovan
Copyright: © 2020 |Pages: 11
DOI: 10.4018/978-1-5225-9715-5.ch008
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

The deep web (also called deepnet, the invisible web, dark web, or the hidden web) refers to world wide web content that is not part of the surface web, which is indexed by standard search engines. The more familiar “surface” web contains only a small fraction of the information available on the internet. The deep web contains much of the valuable data on the web, but is largely invisible to standard web crawling techniques. Besides it being the huge source of information, it also provides the rostrum for cybercrime like by providing download links for movies, music, games, etc. without having their copyrights. This article aims to provide context and policy recommendations pertaining to the dark web. The dark web's complete history, from its creation to the latest incidents and the way to access and their sub forums are briefly discussed with respective to the user perspective.
Chapter Preview
Top

Introduction

Internet is a hardware asset consists of multiple nodes where each node is a server/ client systems such as laptops, computers, etc. In earlier days, the data are transferred or shared using the Internet. In 1994, Berners-Lee et al introduced web in which the data are accessed through hyperlink text or web pages. Web is software which runs over the internet to provide the service to users. Only 4-6% of the whole web or the web pages (surface web) are indexed in search engines such as Google, yahoo, etc. However, web which is not indexed in search engines is 400 times larger than surface web also known as deep web. The deep web (Bergman, 2001) can only be accessed through a special link or with special permission to access the data in the cloud or specialized servers which cannot be found on any of search engines. Government sectors, private bank data, cloud data, etc are examples of the deep web. The data in the deep web are so sensitive and private which are to be kept in secret. These data are allowed to access only by specific people. There is a subset of deep web termed as dark web (Chen et al, 2008). Figure 1 shows the difference of Surface web, Deep web and Dark web.

Figure 1.

Difference of surface web, deep web and dark web

978-1-5225-9715-5.ch008.f01
Source: LeMacnalle

Dark web allows a user to host a website on a specific network termed as dark net which remains anonymous always. The network used by the user to maintain anonymity is dark net. Dark net is a network build over the internet which is completely encrypted. Traditionally, when a user visits any sites, they are tracked via their Internet Protocol (IP) address. However, the dark net maintains privacy through specialized anonymity software and configurations to access. One such dark net is Tor (“The Onion Routing” project) (Dingledine et al, 2004).

Top

Tor And Dark Web

The TOR architecture provides two basic services – anonymous browsing and hosting of anonymous information exchanges. These services are provided by one piece of special software – ‘Tor Browser’. There is no special technical requirement for these services to be bundled. Indeed, browsing is more popular than hosting. No Tor users have visited any hidden website at a *.onion address. Most probably, all the users merely use Tor browser to browse the internet’s conventional address space more securely. For example, Mary, who lives in a small town, wants to buy a pregnancy test but doesn’t want to be seen doing so by the shop owner. Peter, a friend of Mary’s father, wears a mask, walks detours and pay in cash. Peter will not be able to identify or trace. Also, Mary’s privacy and anonymity are assured. Anonymous browsing is not actually a part of ‘dark web’, but it is a legitimate and impressive service provided by Tor. The underlying purpose was to create a distributed, anonymous easily deployable and encrypted network to be used by those who needed it. Specifically, it was offered as a free service to promote unfettered access to the internet in locations where online censorship was heavily enforced. Chaum in 2003 provided a way for this access through onion routing. In order for a user to access the website securely, the person has to be routed through a series of intermediary servers. The resulting pathways between servers were labeled ‘circuits’. Each packet of information to be relayed over the network would be encased in multiple layers of encryption, each to be sequentially peeled away only by the subsequent node in the circuit. Consequently, intermediary nodes could only decrypt one layer of the encryption, preventing access to the underlying data and its originator. The final such hop – or exit node – would reveal the original packet and proceed to deliver it to the desired destination, thus protecting the sender’s identity. As a result, intercepting and decoding the information along its path would be significantly harder – albeit not impossible – to accomplish. The dark web attracted the people who do illegal stuff such as trade, forums, media exchange for terrorists, etc. without getting caught. “Silk Road” is a dark web site which is used to sell drugs and was taken down already by FBI (Cubrilovic, 2014). Friend-Friend and Free net is also a dark web provided by darknet used to transfer file anonymously.

Complete Chapter List

Search this Book:
Reset