Beyond the Onion Routing: Unmasking Illicit Activities on the Dark Web


Authors : Dr. Vijaykumar Bidv; Aishwarya Suryakant Waghmare

Volume/Issue : Volume 9 - 2024, Issue 5 - May

Google Scholar : https://tinyurl.com/5n82vtv5

Scribd : https://tinyurl.com/2sm76xuy

DOI : https://doi.org/10.38124/ijisrt/IJISRT24MAY1698

Abstract : This comprehensive study delves into the complexities of the Dark Web, a concealed segment of the internet that remains invisible to standard search engines and is accessible only through specialized tools like The Onion Router (TOR), which ensures user anonymity. While the Dark Web is celebrated for its capacity to safeguard privacy and foster free expression, it concurrently serves as a sanctuary for illegal endeavours, encompassing drug trafficking, unauthorized arms trading, and a spectrum of cybercrime. The primary objective of this research is to scrutinize the efficacy of onion routing, the foundational technology behind the Dark Web, in preserving user anonymity amidst escalating efforts by law enforcement agencies to dismantle illegal activities. This paper adopts a rigorous approach that melds an exhaustive review of pertinent literature with empirical investigations to pinpoint the intrinsic vulnerabilities within the onion routing framework. Furthermore, the study introduces innovative methodologies aimed at bolstering the detection and neutralization of illicit transactions and communications on the Dark Web. These proposed methods seek to establish a delicate balance between upholding the Dark Web's legitimate functions—such as protecting privacy and enabling free speech—and curtailing its misuse for criminal activities. The paper culminates in a discussion of the broader implications of these findings for policymakers, law enforcement officials, and privacy advocates. It provides a set of recommendations for future research and policy formulation in this intricate and ever-evolving domain, to navigate the challenges posed by the Dark Web while preserving its essential values.

Keywords : Dark Web, TOR, Onion Routing, Cybersecurity, Law Enforcement, Privacy, Anonymity, Cybercrime, Social Network Analysis, Cryptography.

References :

  1. Susuri and A. S. Beshiri, “Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review,” Journal of Computer and Communications, vol. 7, no. 3, p. 14, 2019.
  2. R. W. Gehl, Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, MIT Press, 2018.
  3. M. Chertoff, “A public policy perspective of the Dark Web,” Journal of Cyber Policy, vol. 2, no. 26-38, p. 14, 2017.
  4. Finklea, “Dark Web,” Congressional Research Service, Washington, 2017.
  5. Henderson, Tor Darknet: Master the Art of Invisibility, Scotts Valley, California: CreateSpace Independent Publishing Platform, 2017.
  6. R. Ehney and J. D. Shorter, “DEEP WEB, DARK WEB, INVISIBLE WEB AND THE POST ISIS WORLD,” Issues in Information Systems, vol. 17, no. IV, p. 6, 2016.
  7. E. DILIPRAJ, “TERROR IN THE DEEP AND DARK WEB,” AIR POWER Journal, vol. 9, no. 3, p. 20, 2014.
  8. T. Simon and M. Chertof, “The Impact of the Dark Web on Internet Governance and Cyber Security,” Global Commission on Internet Governance, vol. 6, p. 18, 2015.
  9. R. Basheer and B. Alkhatib, “Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence,” Journal of Computer Networks and Communications, vol. 2021, p. 21, 2021.
  10. J. Hulland, E. Karahanna, C. Salge and F. Thomaz, “Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing,” Journal of the Academy of Marketing Science , p. 21, 2020.
  11. P. Syverson, N. Mathewson and R. Dingledine, Tor: The Second-Generation Onion Router, United States: ResearchGate, 2013, p. 18.
  12. J. P. Timpanaro, T. Cholez, I. Chrisment and O. Festor, “Evaluation of the anonymous I2P network's design choices against performance and security,” in 2015 International Conference on Information Systems Security and Privacy (ICISSP), Angers, France, 2015.
  13. Fernández-Robles, M. W. Al-Nabki, E. Alegre and E. Fidalgo, “ToRank: Identifying the most influential suspicious domains in the Tor network,” Expert Systems with Applications, vol. 123, pp. 212-226, 2019.
  14. Steinebach, F. Brenner and F. Platzer, “Similarity Analysis of Single-Vendor Marketplaces in the Tor-Network,” Journal of Cyber Security and Mobility, vol. 11_2, pp. 205-238, 2022.

This comprehensive study delves into the complexities of the Dark Web, a concealed segment of the internet that remains invisible to standard search engines and is accessible only through specialized tools like The Onion Router (TOR), which ensures user anonymity. While the Dark Web is celebrated for its capacity to safeguard privacy and foster free expression, it concurrently serves as a sanctuary for illegal endeavours, encompassing drug trafficking, unauthorized arms trading, and a spectrum of cybercrime. The primary objective of this research is to scrutinize the efficacy of onion routing, the foundational technology behind the Dark Web, in preserving user anonymity amidst escalating efforts by law enforcement agencies to dismantle illegal activities. This paper adopts a rigorous approach that melds an exhaustive review of pertinent literature with empirical investigations to pinpoint the intrinsic vulnerabilities within the onion routing framework. Furthermore, the study introduces innovative methodologies aimed at bolstering the detection and neutralization of illicit transactions and communications on the Dark Web. These proposed methods seek to establish a delicate balance between upholding the Dark Web's legitimate functions—such as protecting privacy and enabling free speech—and curtailing its misuse for criminal activities. The paper culminates in a discussion of the broader implications of these findings for policymakers, law enforcement officials, and privacy advocates. It provides a set of recommendations for future research and policy formulation in this intricate and ever-evolving domain, to navigate the challenges posed by the Dark Web while preserving its essential values.

Keywords : Dark Web, TOR, Onion Routing, Cybersecurity, Law Enforcement, Privacy, Anonymity, Cybercrime, Social Network Analysis, Cryptography.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe