The Anonymity of the Dark Web: A Survey
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber secu...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9739708/ |
_version_ | 1811309204479148032 |
---|---|
author | Javeriah Saleem Rafiqul Islam Muhammad Ashad Kabir |
author_facet | Javeriah Saleem Rafiqul Islam Muhammad Ashad Kabir |
author_sort | Javeriah Saleem |
collection | DOAJ |
description | The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber security experts agree that online criminal activities are increasing exponentially, and they are also becoming more rampant and intensified. These illegal cyber activities include various destructive crimes that may target a single person or a whole nation, for example, data breaches, ransomware attacks, black markets, mafias, and terrorist attacks. So, maintaining data privacy and secrecy is the new dilemma of the era. This paper has extensively reviewed various attacks and attack patterns commonly applied in the dark web. We have also classified these attacks in our unique trilogies classification system. Furthermore, a detailed overview of existing threat detection techniques and their limitations is discussed for anonymity providing services like Tor, I2P, and Freenet. Finally, the paper has identified significant weaknesses that make the dark web vulnerable to different attacks. |
first_indexed | 2024-04-13T09:38:08Z |
format | Article |
id | doaj.art-bff8912d614b4d018b1ea31dab751e3c |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-04-13T09:38:08Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-bff8912d614b4d018b1ea31dab751e3c2022-12-22T02:52:02ZengIEEEIEEE Access2169-35362022-01-0110336283366010.1109/ACCESS.2022.31615479739708The Anonymity of the Dark Web: A SurveyJaveriah Saleem0https://orcid.org/0000-0001-6510-3279Rafiqul Islam1https://orcid.org/0000-0001-8317-5727Muhammad Ashad Kabir2https://orcid.org/0000-0002-6798-6535School of Computing, Mathematics and Engineering, Charles Sturt University, Albury, NSW, AustraliaSchool of Computing, Mathematics and Engineering, Charles Sturt University, Albury, NSW, AustraliaSchool of Computing, Mathematics and Engineering, Charles Sturt University, Albury, NSW, AustraliaThe dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber security experts agree that online criminal activities are increasing exponentially, and they are also becoming more rampant and intensified. These illegal cyber activities include various destructive crimes that may target a single person or a whole nation, for example, data breaches, ransomware attacks, black markets, mafias, and terrorist attacks. So, maintaining data privacy and secrecy is the new dilemma of the era. This paper has extensively reviewed various attacks and attack patterns commonly applied in the dark web. We have also classified these attacks in our unique trilogies classification system. Furthermore, a detailed overview of existing threat detection techniques and their limitations is discussed for anonymity providing services like Tor, I2P, and Freenet. Finally, the paper has identified significant weaknesses that make the dark web vulnerable to different attacks.https://ieeexplore.ieee.org/document/9739708/Attack taxonomycrimesdark webFreenetI2Pthreat intelligence |
spellingShingle | Javeriah Saleem Rafiqul Islam Muhammad Ashad Kabir The Anonymity of the Dark Web: A Survey IEEE Access Attack taxonomy crimes dark web Freenet I2P threat intelligence |
title | The Anonymity of the Dark Web: A Survey |
title_full | The Anonymity of the Dark Web: A Survey |
title_fullStr | The Anonymity of the Dark Web: A Survey |
title_full_unstemmed | The Anonymity of the Dark Web: A Survey |
title_short | The Anonymity of the Dark Web: A Survey |
title_sort | anonymity of the dark web a survey |
topic | Attack taxonomy crimes dark web Freenet I2P threat intelligence |
url | https://ieeexplore.ieee.org/document/9739708/ |
work_keys_str_mv | AT javeriahsaleem theanonymityofthedarkwebasurvey AT rafiqulislam theanonymityofthedarkwebasurvey AT muhammadashadkabir theanonymityofthedarkwebasurvey AT javeriahsaleem anonymityofthedarkwebasurvey AT rafiqulislam anonymityofthedarkwebasurvey AT muhammadashadkabir anonymityofthedarkwebasurvey |