2019 International Conference on Computational Science and Computational Intelligence (CSCI) 2019
DOI: 10.1109/csci49370.2019.00033
|View full text |Cite
|
Sign up to set email alerts
|

Plunge into the Underworld: A Survey on Emergence of Darknet

Abstract: The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can only be accessed using special network configuration and software tools to access its contents which are not indexed by search engines. Over the years darknets traditionally are used for criminogenic activities and famously acclaimed to promote cybercrime, procurements of ill… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Attacks: In E-authentication, biometrics are used to bind an individual to their identity. There were several potential vulnerabilities identified, including fictitious data, conspiracy with employees, impersonation, and sales of PII in deep web forums [29]. As part of Acacia Medical Centre's commitment to modernizing the hospital's services, this study demonstrates Acacia Medical Centre's readiness to continuously improve it is biometric services.…”
Section: Discussionmentioning
confidence: 87%
“…Attacks: In E-authentication, biometrics are used to bind an individual to their identity. There were several potential vulnerabilities identified, including fictitious data, conspiracy with employees, impersonation, and sales of PII in deep web forums [29]. As part of Acacia Medical Centre's commitment to modernizing the hospital's services, this study demonstrates Acacia Medical Centre's readiness to continuously improve it is biometric services.…”
Section: Discussionmentioning
confidence: 87%
“…Each intermediate node can only communicate with its predecessor and successor relay in Tor services. The nodes are configured in such a way that communications cannot be linked (send/receive data) without the intermediate nodes [3].…”
Section: -Entry Relay Nodesmentioning
confidence: 99%
“…The availability of sophisticated technologies enables criminals to exploit new ways of committing crimes. Criminogenic activities in cyberspace are a critical societal problem that requires the swift intervention of cybersecurity experts [3,30]. There are often misconceptions with the terms "Surface web," "Deep web," and "Dark web," they are relatively interconnected but do not mean exactly the same thing.…”
Section: Introductionmentioning
confidence: 99%
“…In the past decade, several studies [28]- [34] have attempted to analyze the characteristics of transactions conducted in Silk Road 1 and Silk Road 2 in order to disclose their clusters. However, there has been little effort to explore more recent markets, such as Silk Road 3.1 and 4 with respect to transaction patterns.…”
Section: A Silk Road 31mentioning
confidence: 99%