IS THE "DARK WEB" DEEP AND DARK?

Zoran Čekerevac, Zdenek Dvorak, Petar Čekerevac

Abstract


Since its foundation the Internet has, due to the principles on which it was created, evolved in different directions. During its development, two main parts were crystallized, one visible and accessible to ordinary users and tools which should ensure that its use is simple and comfortable, and the other, less affordable and accessible only to those who make a little more effort, for many invisible. Although invisible, it is not exclusive, because everyone can join it, if they want to. This paper intended to make an overview of the state of  use of the Internet at the beginning of 2016 and to analyze advantages and disadvantages of both parts of the Internet. Here are considered only the contents of the Internet, and the contents on private intranet facilities that are located behind firewalls are completely excluded from the analysis, although they contain a large amount of data. At the beginning of the paper, there is considered the terminology used in the literature and in mutual communications of Internet users. Further, there an analysis of visible and invisible parts of the Internet, and an emphasis is placed on the invisible Internet, because it is a less public, and most of people are not familiar with it. The reasons why the invisible Internet has become attractive are discussed in more detail, as well as the way it is created and procedures for its use. Here are also considered the risks to which the invisible Internet is exposed, as well as risks to which  its users may be exposed. In the framework of the conclusions, the dillema of  "transparency or privacy“ is discussed, along with the topic of whether the dark web is really dark, as well as perspectives of development of the Internet.


Keywords


surface web, invisible web, dark web, deep web, lost Internet, Tor, I2S, Internet archeology

Full Text:

PDF (Serbian)

References


sata. (2015, Avgust 18). Šest najužasnijih stvari koje skriva tamna strana interneta. 24 sata. Retrieved from http://www.24sata.hr/tech/sest-najuzasnijih-stvari-koje-skriva-tamna-strana-interneta-422927/foto

Akhoondi, M., Yu, C., & Madhyastha, H. V. (2012, May). LASTor: A Low-Latency AS-Aware Tor client. Proceedings of IEEE Symposium on Security and Privacy (Oakland'12). San Francisco, CA. Retrieved from http://lastor.cs.ucr.edu/oakland12.pdf

Beal, V. (n.d.). DDoS attack - Distributed Denial of Service. Retrieved December 04, 2015, from webopedia: http://www.webopedia.com/TERM/D/DDoS_attack.html

Beckett, A. (2009, November 26). The dark side of the internet . Retrieved from theguardian: http://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenet

Bergman, M. K. (2001). White Paper: The Deep Web: Surfacing Hidden Value. JEP the journal of electronic publishing, 7(1). doi:http://dx.doi.org/10.3998/3336451.0007.104

Bishop, E. (2013, November 18). 5 threats to your security when using social media. Retrieved from SocialTimes: http://www.adweek.com/socialtimes/5-social-media-threats/493325

Blotnej, B. (2015, maj 17). Tamna strana interneta: Stisni 'enter' za ubojstvo i kriminal. Retrieved from 24 sata: http://www.24sata.hr/news/tamna-strana-interneta-stisni-enter-za-ubojstvo-i-kriminal-419601

BOB. (2015, November). BOB - basic open bridge. Retrieved from I2P: https://geti2p.net/en/docs/api/bob

Cunningham, P. (2011, August 6). Email Fundamentals: What is an MX record, and how do they work? Retrieved from exchangeserverpro.com: http://exchangeserverpro.com/mx-record/

Čekerevac, Z. (2013). Small an medium sized enterprises data seccurity in cloud computing. ITEP 2013 (str. 280-283). Chernivtsi: Bukovinski Universitet.

Čekerevac, Z., & Radonjić, S. (2013). Some SMEs data safety and security issues in the in-house and in the cloud computing. 18. medzinarodna vedecka konferencia Riešenie krizovych situacii v špecifickom prostredi (str. 99-106). Žilina: Fakulta špecialneho inžinierstva.

Čekerevac, Z., Anđelić, S., & Radović, D. (2011). Data protection in small and medium sized enterprises. 2011. PROCEEDINGS of International Conference “Smal and Medium Enterprises - Possibilities and Perspectives 2011” (str. 445-456). Novi Pazar, Serbia: International University. Preuzeto sa http://news.uninp.edu.rs/media/filer_public/1e/fe/1efe18dc-cb15-4335-ad94-61c197a16e98/smepp2011.pdf

Čekerevac, Z., Čekerevac, P., & Vasiljević, J. (2014, Jan 15). Internet sigurnost MSP sa aspekta sigurnosti elektronske pošte. FBIM Transactions, 2(1), 45-56. doi:10.12709/fbim.02.02.01.05

Čekerevac, Z., Dvorak, Z., & Čekerevac, P. (2014). Internet safety of SMEs and e-mail protection in the light of recent revelations about espionage of internet communication system. Zbirnyk naukovykh pratsʹ Bukovynsʹkoho universytetu. Ekonomichni nauky, 10.

Čekerevac, Z., Dvorak, Z., & Čekerevac, P. (2014, 07 15). Internet sigurnost u svetlu otkrića Edvarda Snoudena. (Z. Čekerevac, Ur.) FBIM Transactions, 2(2), 68-78. doi:10.12709/fbim.02.02.02.07

Danezis, G. (2005, January). Introducing Traffic Analysis - Attacks, Defences and Public Policy Issues... Retrieved from http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/TAIntro.pdf

darknet. (2015, November 2). Retrieved from Dictionary.com's 21st Century Lexicon: http://dictionary.reference.com/browse/darknet

dark-web. (2015, November 28). Retrieved from Dictionary.com Unabridged: http://dictionary.reference.com/browse/dark-web

Davis, R. (2011, Jun 25). What is Dark Internet, How to Access Onion Domains and Configure Hosting for the Dark Web. Retrieved from The ramblings of a weirdo: http://www.rogerdavies.com/2011/06/dark-internet/#torroutingdiagram

deep-web. (2015, November 28). (Dictionary.com) Retrieved November 28, 2015, from Dictionary.com Unabridged: http://dictionary.reference.com/browse/deep-web

Dnssec.net. (2015, Jun 16). DNSSEC: DNS Security Extensions Securing the Domain Name System. Retrieved from Dnssec.net: http://www.dnssec.net/

Egan, M. (2015, Nov 23). What is the Dark Web? How to access the Dark Web. What's the difference between the Dark Web and the Deep Web? Retrieved from PC Advisor: http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/

Falkvinge, R. (2015, June 18). Google Chrome listening in to your room shows the importance of privacy defense in depth. Retrieved from Privacy Online News: https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/

Goodman, M. (2015, April 1). Most of the web is invisible to Google. Kere's what it contains. Preuzeto sa Popular Science: http://www.popsci.com/dark-web-revealed

Greenwald, G., & MacAskill, E. (2013, 06 07). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. Preuzeto 08 04, 2013 sa http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data

Hill, K. (2015, November 30). The attack that broke the Dark Web—and how Tor plans to fix it. Retrieved from Fusion: http://fusion.net/story/238742/tor-carnegie-mellon-attack/

I2P. (n.d.). I2PTunnel. Retrieved December 3, 2015, from I2P: https://geti2p.net/en/docs/api/i2ptunnel

ICANN. (n.d.). ICANN. Retrieved December 3, 2015, from Internet Corporation for Assigned Names and Numbers: http://archive.icann.org/tr/english.html

Internet Archaeologists Reconstruct Lost Web Pages. (2013, September 18). Retrieved from MIT Technology Review: http://www.technologyreview.com/view/519391/internet-archaeologists-reconstruct-lost-web-pages/

Kessler, M. (2013, July 23). Deutsche User: Zwei Drittel halten ihre Daten im Netz für unsicher. Retrieved from teltarif.de: http://www.teltarif.de/bitkom-internet-nutzer-daten-unsicher-befragung-prism/news/51871.html

Kumar, M. (2011, October 24). Tor anonymizing network Compromised by French researchers. Retrieved from The hacker news: http://thehackernews.com/2011/10/tor-anonymizing-network-compromised-by.html

Labovitz, C., Ahuja, A., & Bailey, M. (2001). Shining light on dark address space. Ann Arbor, Michigan, USA: Arbor Netwoks. Retrieved from http://mdbailey.ece.illinois.edu/publications/dark_address_space.pdf

Le Blond, S., Manils, P., Chaabane, A., Ali Kaafar, M., Castelluccia, C., Legout, A., & Dabbous, W. (2011, March). One bad apple spoils the bunch: Exploiting P2P applications to trace and profile Tor users. Retrieved from usenix: https://www.usenix.org/legacy/events/leet11/tech/full_papers/LeBlond.pdf

Mergen, L. (2015). On anonymous networking in Haskell: announcing Tor and I2P for Haskell. Retrieved December 3, 2015, from Luctor et Emergen: http://www.leonmergen.com/haskell/privacy/2015/05/30/on-anonymous-networking-in-haskell-announcing-tor-and-i2p-for-haskell.html

Microsoft. (n.d.). Understanding Reverse Lookup. Retrieved November 30, 2015, from https://technet.microsoft.com/en-us/library/cc730980.aspx

Mikhailian, A. (n.d.). How to block Tor exit nodes from accessing your website. Retrieved from mova.org: http://mikhailian.mova.org/node/194

Nerd, P. (2015, February 26). DNS Crash Course: A, AAAA and PTR Records. Preuzeto sa The Classic Yuppie: https://classicyuppie.com/dns-crash-course-a-aaaa-ptr-records/

Nicholson, J. (2014, February 28). What is a name server? . Retrieved from inmotion hosting: http://www.inmotionhosting.com/support/domain-names/dns-nameserver-changes/what-is-a-name-server

Orchid. (2014, March). Retrieved from Plugins.i2p.xyz/ plugins/ Orchid : http://plugins.i2p.xyz/plugins/orchid/

Osterman Research, I. (2013, July). Why Should You Encrypt Email and What Happens if You Don’t? Retrieved from Osterman Research: http://www.ostermanresearch.com/whitepapers/orwp_0194.pdf

PC. (2015, November 28). Definition of: surface Web. Retrieved from PC Magazine Encyclopedia: http://www.pcmag.com/encyclopedia/term/52273/surface-web

Peachey, P. (2013, October 9). Exposed: The dark side of the internet, where you can buy drugs, sex and indecent images. Retrieved from Independent: http://www.independent.co.uk/news/uk/crime/exposed-the-dark-side-of-the-internet-where-you-can-buy-drugs-sex-and-indecent-images-8723048.html

SAM V3. (2015, November). Preuzeto sa I2P: https://geti2p.net/en/docs/api/samv3

SEOBook. (n.d.). Robots.txt File Generator. Retrieved November 30, 2015, from SEOBook: http://tools.seobook.com/robots-txt/generator/

Srna. (2013, oktobar 08). Tamna strana interneta osvaja tržište. Retrieved from Nezavisne novine: http://www.nezavisne.com/nauka-tehnologija/internet/Tamna-strana-interneta-osvaja-trziste/212804

Syverson, P. (2005). Onion routing. Retrieved December 3, 2015, from Onion-router: http://www.onion-router.net/

Titcomb, J. (2015, November 26). Anonymous hackers install Viagra advert on Islamic State propaganda website. Retrieved from The Telegraph: http://www.telegraph.co.uk/technology/internet/12019053/Anonymous-hackers-install-Viagra-advert-on-Islamic-State-propaganda-website.html

Tor. (n.d.). Retrieved December 3, 2015, from Torproject: https://www.torproject.org/about/overview.html.en

WEBnSTUDY. (2015, avgust 20). Tamni Internet. Preuzeto sa WEBnSTUDY: http://www.webnstudy.com/tema.php?id=tamni-internet

What is a CNAME record? (2015). Retrieved November 30, 2015, from DNSimple.

What is a SOA Record? (2015). Retrieved November 30, 2015, from DNSimple: https://support.dnsimple.com/articles/soa-record/

What is an AAAA record or IPv6? (n.d.). Retrieved November 30, 2015, from No-IP: http://www.noip.com/support/knowledgebase/what-is-an-ipv6-or-aaaa-record/

Wüest, C. (2010). The Risks of Social Networking. Retrieved from symantec: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_risks_of_social_networking.pdf

Yale, B. (2014, October 21). How the Internet Works: The Deep Web. Retrieved from informIT: http://www.informit.com/blogs/blog.aspx?uk=How-the-Internet-Works-The-Deep-Web


Refbacks

  • There are currently no refbacks.