Authors :
Dr. Vijaykumar Bidv; Aishwarya Suryakant Waghmare
Volume/Issue :
Volume 9 - 2024, Issue 5 - May
Google Scholar :
https://tinyurl.com/5n82vtv5
Scribd :
https://tinyurl.com/2sm76xuy
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24MAY1698
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
This comprehensive study delves into the
complexities of the Dark Web, a concealed segment of the
internet that remains invisible to standard search engines
and is accessible only through specialized tools like The
Onion Router (TOR), which ensures user anonymity.
While the Dark Web is celebrated for its capacity to
safeguard privacy and foster free expression, it
concurrently serves as a sanctuary for illegal endeavours,
encompassing drug trafficking, unauthorized arms
trading, and a spectrum of cybercrime. The primary
objective of this research is to scrutinize the efficacy of
onion routing, the foundational technology behind the
Dark Web, in preserving user anonymity amidst
escalating efforts by law enforcement agencies to
dismantle illegal activities. This paper adopts a rigorous
approach that melds an exhaustive review of pertinent
literature with empirical investigations to pinpoint the
intrinsic vulnerabilities within the onion routing
framework. Furthermore, the study introduces
innovative methodologies aimed at bolstering the
detection and neutralization of illicit transactions and
communications on the Dark Web. These proposed
methods seek to establish a delicate balance between
upholding the Dark Web's legitimate functions—such as
protecting privacy and enabling free speech—and
curtailing its misuse for criminal activities. The paper
culminates in a discussion of the broader implications of
these findings for policymakers, law enforcement
officials, and privacy advocates. It provides a set of
recommendations for future research and policy
formulation in this intricate and ever-evolving domain,
to navigate the challenges posed by the Dark Web while
preserving its essential values.
Keywords :
Dark Web, TOR, Onion Routing, Cybersecurity, Law Enforcement, Privacy, Anonymity, Cybercrime, Social Network Analysis, Cryptography.
References :
- Susuri and A. S. Beshiri, “Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review,” Journal of Computer and Communications, vol. 7, no. 3, p. 14, 2019.
- R. W. Gehl, Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, MIT Press, 2018.
- M. Chertoff, “A public policy perspective of the Dark Web,” Journal of Cyber Policy, vol. 2, no. 26-38, p. 14, 2017.
- Finklea, “Dark Web,” Congressional Research Service, Washington, 2017.
- Henderson, Tor Darknet: Master the Art of Invisibility, Scotts Valley, California: CreateSpace Independent Publishing Platform, 2017.
- R. Ehney and J. D. Shorter, “DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLD,” Issues in Information Systems, vol. 17, no. IV, p. 6, 2016.
- E. DILIPRAJ, “TERROR IN THE DEEP AND DARK WEB,” AIR POWER Journal, vol. 9, no. 3, p. 20, 2014.
- T. Simon and M. Chertof, “The Impact of the Dark Web on Internet Governance and Cyber Security,” Global Commission on Internet Governance, vol. 6, p. 18, 2015.
- R. Basheer and B. Alkhatib, “Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence,” Journal of Computer Networks and Communications, vol. 2021, p. 21, 2021.
- J. Hulland, E. Karahanna, C. Salge and F. Thomaz, “Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing,” Journal of the Academy of Marketing Science , p. 21, 2020.
- P. Syverson, N. Mathewson and R. Dingledine, Tor: The Second-Generation Onion Router, United States: ResearchGate, 2013, p. 18.
- J. P. Timpanaro, T. Cholez, I. Chrisment and O. Festor, “Evaluation of the anonymous I2P network's design choices against performance and security,” in 2015 International Conference on Information Systems Security and Privacy (ICISSP), Angers, France, 2015.
- Fernández-Robles, M. W. Al-Nabki, E. Alegre and E. Fidalgo, “ToRank: Identifying the most influential suspicious domains in the Tor network,” Expert Systems with Applications, vol. 123, pp. 212-226, 2019.
- Steinebach, F. Brenner and F. Platzer, “Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network,” Journal of Cyber Security and Mobility, vol. 11_2, pp. 205-238, 2022.
This comprehensive study delves into the
complexities of the Dark Web, a concealed segment of the
internet that remains invisible to standard search engines
and is accessible only through specialized tools like The
Onion Router (TOR), which ensures user anonymity.
While the Dark Web is celebrated for its capacity to
safeguard privacy and foster free expression, it
concurrently serves as a sanctuary for illegal endeavours,
encompassing drug trafficking, unauthorized arms
trading, and a spectrum of cybercrime. The primary
objective of this research is to scrutinize the efficacy of
onion routing, the foundational technology behind the
Dark Web, in preserving user anonymity amidst
escalating efforts by law enforcement agencies to
dismantle illegal activities. This paper adopts a rigorous
approach that melds an exhaustive review of pertinent
literature with empirical investigations to pinpoint the
intrinsic vulnerabilities within the onion routing
framework. Furthermore, the study introduces
innovative methodologies aimed at bolstering the
detection and neutralization of illicit transactions and
communications on the Dark Web. These proposed
methods seek to establish a delicate balance between
upholding the Dark Web's legitimate functions—such as
protecting privacy and enabling free speech—and
curtailing its misuse for criminal activities. The paper
culminates in a discussion of the broader implications of
these findings for policymakers, law enforcement
officials, and privacy advocates. It provides a set of
recommendations for future research and policy
formulation in this intricate and ever-evolving domain,
to navigate the challenges posed by the Dark Web while
preserving its essential values.
Keywords :
Dark Web, TOR, Onion Routing, Cybersecurity, Law Enforcement, Privacy, Anonymity, Cybercrime, Social Network Analysis, Cryptography.