An Extensive Overview on Dark Web

Bhawna*, Bisman Singh**
*-** Department of Computer Science & Engineering, Chandigarh Group of Colleges, Landran, Mohali, Punjab, India.
Periodicity:July - December'2023
DOI : https://doi.org/10.26634/jdf.1.2.19459

Abstract

The dark web has become an infamous cybercrime platform, enticing criminals with the promise of privacy and encryption. This review paper will delve into the dark web's history and evolution, along with the characteristics that make it an attractive arena for cybercriminals. It will explore various types of crimes occurring on the dark web, such as cyberattacks, data breaches, and online fraud, examining their societal impacts. Additionally, this paper will scrutinize law enforcement activities, cybersecurity technologies, and public education programs designed to thwart crimes on the dark web. It will propose suggestions for future research and policy actions aimed at mitigating the adverse effects of cybercrime on the dark web. This study aims to foster a deeper understanding of the dark web and the societal risks posed by cybercrime, influencing the development of effective strategies to prevent such occurrences.

Keywords

Dark Web, Enforcement Activities, Cybercriminals, Cybersecurity, Cyberattacks, TOR.

How to Cite this Article?

Bhawna, and Singh, B. (2023). An Extensive Overview on Dark Web. i-manager’s Journal on Digital Forensics & Cyber Security, 1(2), 36-49. https://doi.org/10.26634/jdf.1.2.19459

References

[1]. Alayda, S. (2021). Terrorism on dark web. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 3000-3005.
[2]. Aldridge, J., & Decar y-Hétu, D. (2016). Cryptomarkets and the future of illicit drug markets. The Internet and Drug Markets, 23-32.
[5]. Anjum, A., Kaur, D. C., Kondapalli, S., Hussain, M. A., Begum, A. U., Hassen, S. M., & Osman Abdalraheem, D. M. H. (2021). A mysterious and darkside of the darknet: A qualitative study. Webology, 18(4).
[8]. Brito, J., & Castillo, A. (2013). Bitcoin: A Primer for Policymakers, Mercatus Center. George Mason University.
[9]. Broadhurst, R. (2017). Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace. In Cornish, P. (Ed). The Oxford Handbook of Cyber Security.
[10]. Buxton, J., & Bingham, T. (2015). The rise and challenge of dark net drug markets. Policy Brief, 7(2), 1-24.
[11]. Campbell, C. (2018). Web of lives: How regulating the dark web can combat online human trafficking. Journal of the National Association of Administrative Law Judiciary, 38(2), 136-181.
[16]. Davidson, A., Goldberg, I., Sullivan, N., Tankersley, G., & Valsorda, F. (2018). Privacy Pass: Bypassing Internet Challenges Anonymously. Proceedings on Privacy Enhancing Technologies, 2018(3), 1-17.
[18]. Evans, N. S., Dingledine, R., & Grothoff, C. (2009, August). A Practical Congestion Attack on Tor Using Long Paths. In USENIX Security Symposium (pp. 33-50).
[20]. Gehl, R. W. (2018). Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P. MIT Press, England.
[22]. Greco, F., & Greco, G. (2020). Organised crime: Underground economy and regulations to combat cybercrime. European Journal of Political Science Studies, 4(1).
[23]. Gupta, A., Maynard, S. B., & Ahmad, A. (2019). The dark web phenomenon: A review and research agenda. In ACIS 2019 Proceedings, 1.
[26]. Keeley, B., & Little, C. (2017). The State of the World's Children 2017: Children in a Digital World. UNICEF. 3 United Nations Plaza, New York.
[36]. Lavorgna, A. (2020). Cybercrimes: Critical Issues in a Global Context. Bloomsbury Publishing.
[51]. Reddy, E., & Minnaar, A. (2018). Cryptocurrency: A tool and target for cybercrime. Acta Criminologica: African Journal of Criminology & Victimology, 31(3), 71-92.
[52]. Romeo, A. D. (2016). Hidden threat: The dark web surrounding cyber security. Northern. Kentucky Law Review, 43(1), 73-86.
[53]. Sabillon, R., Cano, J. J., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6), 165-176.
[56]. Shinder, D. L., & Cross, M. (2008). Scene of the Cybercrime. Syngress Publishing Inc., Burlington.
[63]. Uma, M., & Padmavathi, G. (2013). A survey on various cyber-attacks and their classification. International Journal of Network Security, 15(5), 390-396.
[64]. Vogt, S. D. (2017). The digital underworld: Combating crime on the dark web in the modern era. Santa Clara Journal of International Law, 15, 104.
[65]. Weimann, G. (2021). Going darker: The challenge of dark net terrorism. Wilson Center (pp. 1-13).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.