The Anonymity of the Dark Web: A Survey

The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber secu...

Full description

Bibliographic Details
Main Authors: Javeriah Saleem, Rafiqul Islam, Muhammad Ashad Kabir
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9739708/
_version_ 1811309204479148032
author Javeriah Saleem
Rafiqul Islam
Muhammad Ashad Kabir
author_facet Javeriah Saleem
Rafiqul Islam
Muhammad Ashad Kabir
author_sort Javeriah Saleem
collection DOAJ
description The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber security experts agree that online criminal activities are increasing exponentially, and they are also becoming more rampant and intensified. These illegal cyber activities include various destructive crimes that may target a single person or a whole nation, for example, data breaches, ransomware attacks, black markets, mafias, and terrorist attacks. So, maintaining data privacy and secrecy is the new dilemma of the era. This paper has extensively reviewed various attacks and attack patterns commonly applied in the dark web. We have also classified these attacks in our unique trilogies classification system. Furthermore, a detailed overview of existing threat detection techniques and their limitations is discussed for anonymity providing services like Tor, I2P, and Freenet. Finally, the paper has identified significant weaknesses that make the dark web vulnerable to different attacks.
first_indexed 2024-04-13T09:38:08Z
format Article
id doaj.art-bff8912d614b4d018b1ea31dab751e3c
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-13T09:38:08Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-bff8912d614b4d018b1ea31dab751e3c2022-12-22T02:52:02ZengIEEEIEEE Access2169-35362022-01-0110336283366010.1109/ACCESS.2022.31615479739708The Anonymity of the Dark Web: A SurveyJaveriah Saleem0https://orcid.org/0000-0001-6510-3279Rafiqul Islam1https://orcid.org/0000-0001-8317-5727Muhammad Ashad Kabir2https://orcid.org/0000-0002-6798-6535School of Computing, Mathematics and Engineering, Charles Sturt University, Albury, NSW, AustraliaSchool of Computing, Mathematics and Engineering, Charles Sturt University, Albury, NSW, AustraliaSchool of Computing, Mathematics and Engineering, Charles Sturt University, Albury, NSW, AustraliaThe dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber security experts agree that online criminal activities are increasing exponentially, and they are also becoming more rampant and intensified. These illegal cyber activities include various destructive crimes that may target a single person or a whole nation, for example, data breaches, ransomware attacks, black markets, mafias, and terrorist attacks. So, maintaining data privacy and secrecy is the new dilemma of the era. This paper has extensively reviewed various attacks and attack patterns commonly applied in the dark web. We have also classified these attacks in our unique trilogies classification system. Furthermore, a detailed overview of existing threat detection techniques and their limitations is discussed for anonymity providing services like Tor, I2P, and Freenet. Finally, the paper has identified significant weaknesses that make the dark web vulnerable to different attacks.https://ieeexplore.ieee.org/document/9739708/Attack taxonomycrimesdark webFreenetI2Pthreat intelligence
spellingShingle Javeriah Saleem
Rafiqul Islam
Muhammad Ashad Kabir
The Anonymity of the Dark Web: A Survey
IEEE Access
Attack taxonomy
crimes
dark web
Freenet
I2P
threat intelligence
title The Anonymity of the Dark Web: A Survey
title_full The Anonymity of the Dark Web: A Survey
title_fullStr The Anonymity of the Dark Web: A Survey
title_full_unstemmed The Anonymity of the Dark Web: A Survey
title_short The Anonymity of the Dark Web: A Survey
title_sort anonymity of the dark web a survey
topic Attack taxonomy
crimes
dark web
Freenet
I2P
threat intelligence
url https://ieeexplore.ieee.org/document/9739708/
work_keys_str_mv AT javeriahsaleem theanonymityofthedarkwebasurvey
AT rafiqulislam theanonymityofthedarkwebasurvey
AT muhammadashadkabir theanonymityofthedarkwebasurvey
AT javeriahsaleem anonymityofthedarkwebasurvey
AT rafiqulislam anonymityofthedarkwebasurvey
AT muhammadashadkabir anonymityofthedarkwebasurvey