Abstract
This chapter presents the main differences of the surface web, Deep Web and Dark Web as well as their dependences. It further discusses the nature of the Dark Web and the structure of the most prominent darknets, namely, Tor, I2P and Freenet, and provides technical information regarding the technologies behind these darknets. In addition, it discusses the effects police actions on the surface web can have on the Dark Web, the “dilemma” of usage that anonymity technologies present,as well as the challenges LEAs face while trying to prevent and fight against crime and terrorism in the Dark Web.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Aschmann, L. Leenen, J. Jansen van Vuuren, The Utilisation of the Deep Web for Military Counter Terrorist Operations. (Academic Conferences and publishing limited, s.l., 2017)
M. Balduzzi, V. Ciancaglini, Cybercrime in the Deep Web (Black Hat Europe, Amsterdam, 2015)
M.J. Barratt, S. Lenton, M. Allen, Internet content regulation, public drug websites and the growth in hidden internet services. Drugs 20(3), 195–202 (2013)
H. Bin, M. Patel, Z. Zhang, Accessing the deep web: A suervey. Commun. ACM 50, 94–101 (2007)
Bright Planet, Clearing Up Confusion – Deep Web vs. Dark Web. [Online] (2014), Available at: https://brightplanet.com/2014/03/clearing-confusion-deep-web-vs-dark-web/
P. Brink et al., MEDIA4SEC Report on State of the Art Review. (MEDIA4SEC, s.l., 2016)
B. Brown, Threat Advisory: 2016 State of the Dark Web. (AKAMAI Threat Advisory, s.l., 2016)
E. Çalışkan, T. Minárik, A.-M. Osula, Technical and Legal Overview of the Tor Anonymity Network. (NATO Cooperative Cyber Defence Centre of Excellence, s.l., 2015)
I. Clarke, O. Sandberg, B. Wiley, T.W. Hong, Freenet: A distributed anonymous information storage and retrieval system, in Designing Privacy Enhancing Technologies, ed. by H. Federrath, (Springer, Berlin, Heidelberg, 2001), pp. 46–66
I. Clarke, O. Sandberg, M. Toseland, V. Verendel, Private Communication Through a Network of Trusted Connections: The Dark Freenet. (Network, s.l., 2010)
R. Dingledine, N. Mathewson, S. Paul, Tor: The Second-Generation Onion Router (Naval Research Lab, Washington, DC, 2004)
C. Egger, J. Schlumberger, C. Kruegel, G. Vigna, in Practical attacks against the I2P network, ed. by A. S. C. V. W, S. J. Stolfo. Research in Attacks, Intrusions, and Defences (Springer-Verlag Berlin Heidelberg, Berlin, 2013), pp. 432–451
EMCDDA–Europol, EU Drug Markets Report: In-Depth Analysis (European Monitoring Centre for Drugs and Drug Addiction and Europol) (Publications Office of the European Union, Luxembourg, 2016)
H. Erkkonen, J. Larsson, C. Datateknik, Anonymous Networks. (Computer communication and distributed systems, s.l., 2007)
Freenet project, Documentation. [Online] (2018a), Available at: https://freenetproject.org/pages/documentation.html. Accessed on 26 Mar 2018
Freenet project, Freenet Help. [Online] (2018b), Available at: https://freenetproject.org/pages/help.html. Accessed on 26 Feb 2018
M. Griffiths, Monitoring Internet Communications (POST – Parliamentary Office of Science and Technology, London, 2013)
C. Guitton, A review of the available content on Tor hidden services: The case against further development. Comput. Hum. Behav. 29(6), 2805–2815 (2013)
B. Hawkins, Under The Ocean of the Internet – The Deep Web (SANS Institute-InfoSec Reading Room, 2016)
G. Hussain, E.M. Saltman, Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter It (Quilliam, s.l., 2014)
I2P, i2p Tunnel Implementation. [Online] (2018a), Available at: https://geti2p.net/en/docs/tunnels/implementation. Accessed on 23 Mar 2018
I2P, The Network Database. [Online] (2018b), Available at: https://geti2p.net/en/docs/how/network-database. Accessed on 23 Mar 2018
I2P Garlic Routing, Garlic Routing and “Garlic” Terminology. [Online] (2018), Available at: https://geti2p.net/en/docs/how/garlic-routing. Accessed on 22 Feb 2018
V.V. Immonen, Alice in Onion Land: On Information Security of Tor (ITA-SUOMEN YLIOPISTO, s.l., 2016)
E. Jardine, The Dark Web Dilemma: Tor, Anonymity and Online Policing. Global Commission on Internet Governance Paper Series, Band 21 (2015)
C. Nath, T. Kriechbaumer, The Darknet and Online Anonymity (POST – Parliamentary Office of Science and Technology, London, 2015)
H. Neal, Wikimedia commons. [Online] (2008), Available at: https://commons.wikimedia.org/wiki/File:Onion_diagram.svg. Accessed on Apr 2018
C. Sherman, G. Price, The Invisible Web: Uncovering Information Sources Search Engines Can’t See (Information Today, Medford, 2007)
T. Stevens, Regulating the ‘Dark web’: How a two-fold approach can tackle peer-to-peer radicalisation. RUSI J. 154(2), 28–33 (2009)
J. Strickland, Who owns the Internet? [Online] (2014), Available at: https://computer.howstuffworks.com/internet/basics/who-owns-internet.htm
Syverson P, Basic Course on Onion Routing (U.S. Naval Research Laboratory, s.l., 2015)
The Tor Project, The Legal FAQ for Tor Relay Operators. [Online] (2018a), Available at: https://www.torproject.org/eff/tor-legal-faq.html.en. Accessed on 20 Nov 2019
The Tor Project, Tor Project: FAQ. [Online] (2018b), Available at: https://www.torproject.org/docs/faq.html.en#EntryGuards. Accessed on 20 Nov 2019
The Tor Project, The Solution: A Distributed, Anonymous Network. [Online] (2019a), Available at: https://www.torproject.org/about/overview.html.en#thesolution. Accessed on 21 Mar 2019
The Tor Project, Tor Metrics. [Online] (2019b), Available at: https://metrics.torproject.org/. Accessed on 20 Nov 2019
The Tor Project, Tor Project. [Online] (2019c), Available at: https://www.torproject.org/. Accessed on 20 Nov 2019
The Tor Project, Tor: Bridges. [Online] (2019d), Available at: https://www.torproject.org/docs/bridges.html.en. Accessed on 21 Mar 2019
The Tor Project, Tor Relay Guide – Tor Bug Tracker & Wiki. [Online] (2019e), Available at: https://trac.torproject.org/projects/tor/wiki/TorRelayGuide. Accessed on 22 Feb 2019
Tor Challenge, What Is a Tor Relay? [Online] (2018), Available at: https://www.eff.org/torchallenge/what-is-tor.html. Accessed on 21 Mar 2018
Tor Metrics, Relay Search-Flag: Authority. [Online] (2019), Available at: https://metrics.torproject.org/rs.html#search/flag:authority. Accessed on 29 Nov 2019
G. Weimann, Going dark: Terrorism on the dark web. Stud. Confl. Terror. 39(3), 195–206 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kavallieros, D., Myttas, D., Kermitsis, E., Lissaris, E., Giataganas, G., Darra, E. (2021). Understanding the Dark Web. In: Akhgar, B., Gercke, M., Vrochidis, S., Gibson, H. (eds) Dark Web Investigation. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-55343-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-55343-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-55342-5
Online ISBN: 978-3-030-55343-2
eBook Packages: Computer ScienceComputer Science (R0)