Dark Web: A Web of Crimes

@article{Kaur2020DarkWA,
  title={Dark Web: A Web of Crimes},
  author={Shubhdeep Kaur and Sukhchandan Randhawa},
  journal={Wireless Personal Communications},
  year={2020},
  volume={112},
  pages={2131-2158}
}
Internet plays an important role in our day to day life. It has become an integrated part of all daily activities or lifestyle. Dark Web is like an untraceable hidden layer of the Internet which is commonly used to store and access the confidential information. But there are number of incidents which reported the misuse of this platform for conducting the criminal and illegal activities in a hidden manner. In this paper, an overview of dark web and various browsers which are used to access dark… 
A Mysterious and Darkside of The Darknet: A Qualitative Study
TLDR
This paper reveals the mysterious and invisible facts of the darknet in various ways.
THE ESSENCE OF CYBERSECURITY THROUGH FINTECH 3.5 IN PREVENTING AND DETECTING FINANCIAL FRAUD: A LITERATURE REVIEW
TLDR
The role of cybersecurity, which is aided by Artificial Intelligence (AI) in preventing and detecting financial fraud, is explored, encompassing its tools, applications, challenges, and regulatory conditions that influences its function.
Digital Transformation of Cyber Crime for Chip-Enabled Hacking
TLDR
In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking.
Black Widow Crawler for TOR network to search for criminal patterns
TLDR
Compared to the current crawler, the Black Widow crawler achieved a 240% improvement in the number of indexed secret services and a comparison of the results with one of the best crawlers found during information gathering is carried out.
Classification of Tor network traffic using CNN
TLDR
A novel classification model that can detect Tor traffic and classify the traffic types based on CNN (Convolutional Neural Network) is proposed.

References

SHOWING 1-10 OF 11 REFERENCES
BlackWidow: Monitoring the Dark Web for Cyber Security Information
TLDR
This work presents BlackWidow, a highly automated modular system that monitors Dark Web services and fuses the collected data in a single analytics framework that can infer relationships between authors and forums and detect trends for cybersecurity-related topics.
Exploring Anonymous Depths of Invisible Web and the Digi-Underworld
TLDR
The Deep Net further has various aspects, including Dark Web, which now acts as a platform for smuggling and more malicious activities, taking advantage of the privacy provided in this means.
The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box
Many believe a Google search can identify most of the information available on the Internet on a given subject. But there is an entire online world – a massive one – beyond the reach of Google or any
The not so dark side of the darknet: a qualitative study
TLDR
Drawing on qualitative findings, it is suggested that many users of the Darknet might not perceive it as intrinsically criminogenic, despite their acknowledgement of various kinds of criminal activity in this network.
The 21st Century DarkNet Market: Lessons from the Fall of Silk Road
TLDR
This research explores the behavior of the Dark Net user base surrounding the closure of Silk Road in October of 2013 with the intent of helping determine the future of theDark Net markets, and what form, if any, a new version of Silkroad could take.
Darknet Security: A Categorization of Attacks to the Tor Network
TLDR
This paper deeply investigates the literature of attacks against the Tor network, presenting the most relevant threats in this context and proposes an exhaustive taxonomy based on the target of the attack, a characterization scheme to identify cyber-attacks related to darknet environments and better understand their functioning.
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
TLDR
It is shown that, unfortunately, flow correlation attacks can be conducted on Tor traffic with drastically higher accuracies than before by leveraging emerging learning mechanisms, and designed a system, called DeepCorr, that outperforms the state-of-the-art by significant margins in correlating Tor connections.
The Impact of the Dark Web on Internet Governance and Cyber Security
The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors.
A public policy perspective of the Dark Web
The Dark Web is at the centre of the debate over whether online anonymity should be maintained in spite of the illegal activity that it enables. Policy-makers must gain an understanding of the Dark...
...
1
2
...