CFP last date
20 January 2025
Reseach Article

Dark Web

by Taranvir Singh Sablok, Charu Virmani, Varun Chauhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 12
Year of Publication: 2020
Authors: Taranvir Singh Sablok, Charu Virmani, Varun Chauhan
10.5120/ijca2020920577

Taranvir Singh Sablok, Charu Virmani, Varun Chauhan . Dark Web. International Journal of Computer Applications. 175, 12 ( Aug 2020), 1-4. DOI=10.5120/ijca2020920577

@article{ 10.5120/ijca2020920577,
author = { Taranvir Singh Sablok, Charu Virmani, Varun Chauhan },
title = { Dark Web },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2020 },
volume = { 175 },
number = { 12 },
month = { Aug },
year = { 2020 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number12/31502-2020920577/ },
doi = { 10.5120/ijca2020920577 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:24:49.019936+05:30
%A Taranvir Singh Sablok
%A Charu Virmani
%A Varun Chauhan
%T Dark Web
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 12
%P 1-4
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet is already recognised and being used extensively during this period .We explore information, watch videos and movies, interact through social media such as Facebook, Kik and Twitter and do almost everything on the internet . Yet, maximum number of people don’t know that the regular use of Web is just about 27% of the entire World Wide Web. The greater part of World Wide Web usage is on the deep web which includes the dark web. What is confidential in the deep web? The deep web contains countless unlawful activities and unlawful materials even criminal involvement. It has become the breeding ground for the cyber offenders where by it’s a place where cyber offenders get together and collect to spread the darkness. Drug dealer, Hackers, virus creators, terrorist, sex addict, stalkers, paedophiles, bullies and all inconceivable people are there. Phishing, identity theft, virus and malware is there all the time. A small fault can cause indispensable consequences, you can be tracked, exposed, kidnapped or even assassinate if you are not cautious. The deep web typically has 3 configurations, search engine, browser and website. It is alike to the surface web and using altered tools and configurations. The issues while in the deep web is how the work happens there, maximum of it is by the use of crypto currency as its leading transaction. Deep web is the number one habitation for the hacker, they are travelling around and do activities to analyse, training and test their capabilities. Therefore, it is suitable that deep web is the shell for them. Don’t complicate between Dark Web and Deep Web, the dark web is the part of the deep web and the deep web has a greater explanation from dark web. To get in the dark web you need to use a distinct browser named TOR Browser.it is not to be confused with something that you do not apprehend, you essentially learn to shelter when you access dark web. Officials must gain a thoughtful of the Dark Web in command to include rationally in the discussion and pass actual dark web strategy.

References
  1. T. R. Daniel Moore, "Cryptopolitik and the Darknet," 1 Feb 2016.
  2. TheDarkWebLinks, What is the Deep Web? The Definitive Guide , 2019.
  3. J. Hale, "What is the dark web? From drugs and guns to the Chloe Ayling kidnapping, a look inside the encrypted network," 2 Aug 2019.
  4. C. Sheils, "The Deep & Dark Web: What Lies Beneath The Internet’s Surface?," 1 October 2019.
  5. Darren Guccione, "What is the dark web? How to access it and what you'll find," 4 July 2019.
  6. S. R. Koyande, Y. V. S. Reddy and M. Dendge, "Invisible Web," May-Jun 2018.
  7. M. G. Ionita and P. V. V. Patriciu, "Defending Against Attacks from the Dark Web - Using Neural Networks and Automated Malware Analysis," Jul 2016.
  8. E. Jardine, "The Dark Web Dilemma: Tor, Anonymity and Online Policing," Sep 2015.
  9. E. Dilipraj, "Terror in the deep and Dark web," Sep 2017.
  10. M. Chertoff, "A public policy perspective of the Dark Web," 13 Mar 2017.
  11. P. Narasimhan, "What is Agora in the dark web?," 11 Jul 2017.
  12. O. Bertrand, ""The Dark Web: What’s Beneath The Tip of an iceberg?," 8 May 2017.
  13. C. R. R. M. A. S. J. G. a. L. C. Danielle LeFrancois, "Hackers and the Dark Net: A Look into Hacking and the Deep Web," vol. 5, no. 1, 2017-2018.
  14. J. Porup, "What is the Tor Browser? How it works and how it can help you protect your identity online," 15 Oct 2019
Index Terms

Computer Science
Information Sciences

Keywords

Deep web T O R dark web commerce search engine browser hackers