Dr.Purushottam Petare
Associate Professor
School of Engineering & Management,
D. Y. Patil Education Society,
Deemed to be University, Kolhapur.
 The Dark Web, also known as Darknet,
is a part of the world wide web where
most of the illegal activities take place
on the internet. From phishing to scams
and much more, these attacks are very
harmful, and most cyber experts are
trying to figure out a way to solve this
problem.
 You must have heard of the dark web in
movies and pop culture, but it is not
what you see there. It is a much more
complicated place on the internet. So,
lets get started on the Dark web and its
meaning.
 What is the Dark Web?
 The dark web is a part of the internet
where the identity of the individuals or
groups present inside is not tracked.
Hence, for hackers and criminals, it
serves as a place to hide their identity
and stay anonymous from the real
world. This is how hackers stay out of
the radar of crime agencies, and
conduct illicit activities without any
disruptions.
 How does the Dark Web Work?
 The dark web is an unsecured place for
any user. However, due to increasing
trends and curiosity, many users find
ways to access the dark web. This is
mainly done using specialized software
services like Tor, and advanced search
engines like Onion. These services offer
anonymity, and users can utilize these
facilities for both legal as well as illegal
activities.
 Some of these features are given in the following
section −
• Identity Hiding − As we have already discussed, the
dark web uses a different server that hides
information about users and their identity.
• Easy Access − The dark web is easily accessible to
anyone around the world. This helps different
scammers connect with a global audience who are
desperate to find something on this platform.
• Market for Illegal Goods − All major illegal cyber
activities find a home on this platform. These
include activities like scams, frauds, money
laundering, illicit deals, and many more.
 Onion Routing in Dark Web
 The dark web can be accessed in
various ways. One of the most popular
ways to access the dark web is via
Onion routing. Onion routing is a wide
term for different service providers that
use the dark web.
 One of these services is Tor, which is
very popular for accessing the Dark
web. When you use Tor, the internet
traffic loaded in the servers is encrypted
in multiple layers. This layered data is
sent through random servers or nodes
which are operated by users worldwide.
At each node in the network, one layer
of encryption is destroyed.
 After successive traversal of nodes, the data would
have lost its original encryption, and it becomes
anonymous. Thereafter, by routing traffic using
multiple servers, just like the layers of an onion, Tor
masks the IP address of the users. This masking
makes online tracking of activities nearly impossible.
 As a learning activity, we can access dark websites
by installing special software packages like Tor.
After successful installation, we need to change the
address of the websites by
replacing .com or .net with .onion.
 Thank You

Cyber Security - Dark Web by Dr.Purushottam Petare.ppt

  • 1.
    Dr.Purushottam Petare Associate Professor Schoolof Engineering & Management, D. Y. Patil Education Society, Deemed to be University, Kolhapur.
  • 2.
     The DarkWeb, also known as Darknet, is a part of the world wide web where most of the illegal activities take place on the internet. From phishing to scams and much more, these attacks are very harmful, and most cyber experts are trying to figure out a way to solve this problem.
  • 3.
     You musthave heard of the dark web in movies and pop culture, but it is not what you see there. It is a much more complicated place on the internet. So, lets get started on the Dark web and its meaning.
  • 4.
     What isthe Dark Web?  The dark web is a part of the internet where the identity of the individuals or groups present inside is not tracked. Hence, for hackers and criminals, it serves as a place to hide their identity and stay anonymous from the real world. This is how hackers stay out of the radar of crime agencies, and conduct illicit activities without any disruptions.
  • 5.
     How doesthe Dark Web Work?  The dark web is an unsecured place for any user. However, due to increasing trends and curiosity, many users find ways to access the dark web. This is mainly done using specialized software services like Tor, and advanced search engines like Onion. These services offer anonymity, and users can utilize these facilities for both legal as well as illegal activities.
  • 6.
     Some ofthese features are given in the following section − • Identity Hiding − As we have already discussed, the dark web uses a different server that hides information about users and their identity. • Easy Access − The dark web is easily accessible to anyone around the world. This helps different scammers connect with a global audience who are desperate to find something on this platform. • Market for Illegal Goods − All major illegal cyber activities find a home on this platform. These include activities like scams, frauds, money laundering, illicit deals, and many more.
  • 7.
     Onion Routingin Dark Web  The dark web can be accessed in various ways. One of the most popular ways to access the dark web is via Onion routing. Onion routing is a wide term for different service providers that use the dark web.
  • 9.
     One ofthese services is Tor, which is very popular for accessing the Dark web. When you use Tor, the internet traffic loaded in the servers is encrypted in multiple layers. This layered data is sent through random servers or nodes which are operated by users worldwide. At each node in the network, one layer of encryption is destroyed.
  • 10.
     After successivetraversal of nodes, the data would have lost its original encryption, and it becomes anonymous. Thereafter, by routing traffic using multiple servers, just like the layers of an onion, Tor masks the IP address of the users. This masking makes online tracking of activities nearly impossible.  As a learning activity, we can access dark websites by installing special software packages like Tor. After successful installation, we need to change the address of the websites by replacing .com or .net with .onion.
  • 11.

Editor's Notes

  • #1 Thank you for that introduction . In order to understand my presentation better and provide context on why I chose to make my presentation the way I have, I wish to briefly introduce myself. I , alongwith a number of my colleagues from the member states of the WTO work on the alleged reform of the dispute settlement understanding. We are a band of mostly happy lawyers who have been kindly accused in the past of fixing what aint broke as most people would agree that by and large , the system of settlement of disputes has been delivering regardless of the impasse in the DDA. Therefore what follows , is to my mind, a creative look at what could be the shape of things to come.