Dark Web and Cyber Scams: A Growing Threat to Online Safety

Authors

  • Nagaraju Arthan University of Cumberlands, Williamsburg, Kentucky.
  • Goutham Kacheru Infostretch Corporation, United States
  • Rohit Bajjuru Southern Illinois University Edwardsville

DOI:

https://doi.org/10.47709/ijmdsa.v2i1.2395

Keywords:

Future of medicine, harnessing the power, A Revolutionizing healthcare, precision diagnosis, Proactive disease prevention

Abstract

Internet as of now can be considered, and often is, a part of people’s lives, a continuation of its existence; the same can be said about Dark Web: Indeed, when I first applied the analysis to the opportunity sample, with the blink of an eye, it can be readily deduced that this type belongs to the high opportunity type as well as the high threat type. Where in its so-called objectives of private investigations it has assigned the alibi for the mask of its authorizing it now becomes an opened invitation for unlawful activities. This papers therefore seeks to identify the dark Web and some of the positive attributes and some of the negative externalities that are inevitably associated with any attempted formal classification of access to and control over browsers. The following are threats that exist within the platform in the above said area described as attacks, exploits and malwares. They also categories type of kind’s offence in the Dark Web in other to let more people know about existence of the areas and how to protect yourself.

References

Chertof, M. (2017). A public policy perspective of the Dark Web. Journal Cyber Policy, 2(1), 26–38.

Ciancaglini, V., Balduzzi, M., & Goncharov, M. [Online]. Retrieved December 20, 2019, from https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/deep-web-and-cybercrime-its-not-all-about-tor .

Mirea, M., Wang, V., & Jung J. (2019). The not so dark side of the dark net: a qualitative study. Security Journal, 32, 102–118.

Mirea, M., Wang, V., & Jung, J. (2018). The not so dark side of the dark net: A qualitative study. Security Journal, 32, 102–118.

Çal??kan, E., Minárik, T., & Osula, A.-M. (2015). Technical and legal overview of the tor anonymity network. Tallinn: NATO Cooperative Cyber Defense Centre of Excellence.

“PGP Encryption.” [Online]. Retrieved December 16, 2019, form https://www.technadu.com/pgpencryption-dark-web/57005/.

“Onion Routing.” [Online]. Retrieved December 16, 2019, from https://www.geeksforgeeks.org/onionrouting/

“Types of Relays.” [Online]. Retrieved December 14, 2019, from https://community.torproject.org/relay/types-of-relays/ .

“TOR Nodes List.” [Online]. Retrieved December 20, 2019, from https://www.dan.me.uk/tornodes.

“Welcome to the Tor Bulk Exit List exporting tool.” [Online]. Retrieved December 20, 2019, from https://check.torproject.org/cgi-bin/TorBulkExitList.py .

“Relay Search.” [Online]. Retrieved December 16, 2019, from https://metrics.torproject.org/rs.html.

Rudesill, D. S., Caverlee, J., & Sui, D. (2015). The deep web and the darknet: A look inside the internet’s massive black box. Ohio State Public Law Working Paper No. 314.

Naseem, I., Kashyap, A. K., & Mandloi, D. (2016). Exploring anonymous depths of invisible web and the digi-underworld. International Journal of Computer Applications, NCC (3), 21–25.

Van Hout, M. C., & Bingham, T. (2013). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385–391.

Foltz, R. (2013). Silk Road and migration. In: Encyclopedia of global human migration. https://doi.org/10.1002/9781444351071.wbeghm484 .

Lacson, W., & Jones, B. (2016). The 21st century Dark Net market: Lessons from the fall of Silk Road. International Journal of Cyber Criminology, 10(1), 40–61.

Finklea, K. (2017) Dark web report published by Congressional Research Service.

“Types of Attacks.” [Online]. Retrieved December 16, 2019, from https://www.rapid7.com/funda mentals/types-of-attacks/.

Cambiaso, E., Vaccari, I., Patti, L., & Aiello, M. (2019). Darknet security: A categorization of attacks to the TOR network. In: Italian Conference on Cyber Security.

Evers, B., Hols, J., Kula, E., Schouten, J., Toom, M. den, Laan R. M. van der, Pouwelse J. A. (2015). “Thirteen years of tor attacks”. [Online]. https://github.com/Attacks-on-Tor/Attacks-on-Tor . Accessed 18 Nov 2019.

Nasr, M., Bahramali, A., & Houmansadr, A. (2018) “DeepCorr: Strong fow correlation attacks on tor using deep learning”. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1962–1976).

Zillman, M. P. (2015). Deep Web Research and Discovery Resources 2015. [Online]. Available: https://www.llrx.com/2019/01/deep-web-research-and-discovery-resources-2019/ . Accessed 15 Nov 2019.

“Distributed Denial of Service Attack.” [Online]. Retrieved March 18, 2019, from http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=2&time=16438&view=map .

Schäfer, M., Fuchs, M., & Engel, M. (2019). BlackWidow : Monitoring the dark web for cyber security information. In: Proceedings of the 11th international conference on cyber confict (CyCon), 1–21.

Chertof, M., & Simon, T. (2015). The impact of the dark web on internet Governance and cyber security" Global Commission on Internet Governance. Paper Series No. 6.

“Dark Web.” [Online]. Retrieved November 15, 2019, from https://www.fas.org/sgp/crs/misc/R44101 .

Satterfeld, J. “FBI Tactic in National Child Porn Sting under Attack.” [Online]. Retrieved November 20, 2019, from http://www.usatoday.com/story/news/nation-now/2016/09/05/fbi-tactic-child-pornstingunder-%0Aattack/89892954/.

“Confrmation Attack.” [Online]. Retrieved December 10, 2019, from https://blog.torproject.org/torsecurity-advisory-relay-early-traffic-confrmation-att 29. Ashford, W. “Firms face targeted bespoke cyber-attacks, dark web study reveals.” [Online]. Retrieved December 10, 2019, from https://www.computerweekly.com/news/252464660/Firms-face-targetedbespoke-cyber-attacks-dark-web-study-reveal

Downloads

Published

2023-06-09