BODOLAND
UNIVERSITY
Department of Computer
Science And Technology
Bijay Kumar Singh
MCA 2nd Semester 2017
Roll No:01
CONTENTS
• Introduction: What is Darknet?
• Search Engine.
• Contents found on Darknet.
• Advantages of Darknet.
• Accessing the Darknet.
• How it works?
• Currency of Darknet.
• Top Threats of Darknet.
• Share of Darknet Contents
• Conclusion.
A Presentation on Darknet
What Is DarkNet ?
• Darknet also known as Deep Net / Hidden Web, is
an overlay of networks that can be accessed
through specific softwares, configurations or
Authorization.
• It is all the information that cannot be indexed
using general web search engines.
Search Engines
• Programs that search documents for specified
keywords or phrases and returns a list of
documents where the keywords are found.
• Examples are
In Simple words it can be said that, All pages that
are indexed by a search engine are the visible
web or the surface web, and what’s left of it or
which it can’t access is the Hidden Web,
DeepWeb or the Darknet.
Some experts estimate that as much as 96% of
the entire internet is invisible web content.
Content Found On The Darknet
• Webpages with no links on them, called
disconnected pages.
• Password protected webpages.
• Webpages generated from databases.
• Dynamically generated webpages.
• Real-time content.
• Webpages with non-html text, or any coding
that the program of a regular search engines
cannot understand.
Advantages Of Dark NeT
• Specialized content focus – large amounts of information focused
on an exact subject
• Contains information that might not be available on the visible
web
• Allows a user to find a precise answer to a specific question
• Allows a user to find webpages from a specific date or time.
• Provides Full Version Softwares
• Availability of Pro versions of Android and iOS Apps on Markets
like Blackmart
• Can aquire Banned Books and Applications
• Access to Documentaries Movies and Propaganda videos Banned
by Governments , even Youtube and Facebook is accessed in
Countries where they are banned eg: Pakistan, Iran Gambia ,China
etc.
Accessing the Darknet
Darknet Content can be accessed only through special
anonymizing software called TOR.
TOR Stands for The Onion Routing, it protects the user from
being traced, as the name suggests it has layers of bouncing
Addresses like layers of onion, so no one can either track the
user or can know easily what the user viewed, browsed or
even Purchased.
The Darknet is a Big Market for illegal goods, it can be
referred to as Chorbazar of Internet, and its market is so big
that Amazon and Alibaba Together will appear a Dwarf if
compared.
How IT works ?
Only Graphical Representation
Currency of the Deep Web
Bitcoins an electronic cash system using peer-to-peer
networking, digital signatures and cryptographic proof to enable
irreversible payments between parties without relying on trust.
Payments are issued and transferred by the Bitcoin network.
Participants begin using Bitcoin by first acquiring a Bitcoin wallet and
one or more Bitcoin addresses. Bitcoin addresses are used for receiving
Bitcoins, similar to how e-mail addresses are used for receiving e-mail.
In April 2014, 1 BTC traded at around $4.80 (288 INR). Taking into
account the total number of Bitcoins in circulation, the market
capitalization of the Bitcoin network stands at over 40 million USD (2400
INR)
Top Threats posesSed by DarkNet
Threat #1: Free entry for any cybercriminal
Anyone can choose to enter the darknet markets as a
cybercriminal. There is no bar and this has been made
largely possible with the expanding malware toolsets
now available for the newbie.
Threat #2: Drugs are available in plenty
It is estimated that over 50 percent of the darknet
markets that function using Tor offer narcotics for sale.
These are easily accessible and are sure to incite
interest among the ones that are ready to enter the
world of drugs and cybercrime.
Threat #3: No legislature in place for use of hidden
Threat #4: Cybercrime-Child Pornography
Though it is a fact that the financially and politiccally
motivated often are involved in blackmailing,their
actions are more challenging and they are harder to
control. And since there is no boundation or limitation
and certainly its impossible to impose censorship on
contents on web, hence the major source of
childpornography on the darkweb is the one of the
biggest problem that government all over the six
Continents are concerned about.
Threat #5: Seamless terrorism and
cybercrime
The spread of cybercrime is inevitable and is, of course,
hastened by the facilities provided by hidden services.
The year 2015 saw the globalization of crime. With
Child pornography
Drugs
Counterfeit goods
Hacking information
Politics
Hardware/Software
information
Art
Other/Unknown
Share of Darknet Contents
Conclusion
•Darknet is Mostly used for illegal activities, like
Purchasing of Drugs, Arms, Selling of confidential
Credential of hacked emails and other personal data.
•It is Heaven of Hackers one must always be very careful
while accessing the DarkNet, it is an ocean of Data with
tons of Phishers in it.
•Always be sure to have an authentic Netprotector while
browsing Darknet.
•If used safely and with the right intention it is an universe
of Knowledge, waiting to be explored.
Sources:
•Internet
•Digit Magazines and Russia Today
•Newspaper
Thank You

Darknet

  • 1.
    BODOLAND UNIVERSITY Department of Computer ScienceAnd Technology Bijay Kumar Singh MCA 2nd Semester 2017 Roll No:01
  • 2.
    CONTENTS • Introduction: Whatis Darknet? • Search Engine. • Contents found on Darknet. • Advantages of Darknet. • Accessing the Darknet. • How it works? • Currency of Darknet. • Top Threats of Darknet. • Share of Darknet Contents • Conclusion. A Presentation on Darknet
  • 3.
    What Is DarkNet? • Darknet also known as Deep Net / Hidden Web, is an overlay of networks that can be accessed through specific softwares, configurations or Authorization. • It is all the information that cannot be indexed using general web search engines.
  • 4.
    Search Engines • Programsthat search documents for specified keywords or phrases and returns a list of documents where the keywords are found. • Examples are
  • 5.
    In Simple wordsit can be said that, All pages that are indexed by a search engine are the visible web or the surface web, and what’s left of it or which it can’t access is the Hidden Web, DeepWeb or the Darknet.
  • 6.
    Some experts estimatethat as much as 96% of the entire internet is invisible web content.
  • 7.
    Content Found OnThe Darknet • Webpages with no links on them, called disconnected pages. • Password protected webpages. • Webpages generated from databases. • Dynamically generated webpages. • Real-time content. • Webpages with non-html text, or any coding that the program of a regular search engines cannot understand.
  • 9.
    Advantages Of DarkNeT • Specialized content focus – large amounts of information focused on an exact subject • Contains information that might not be available on the visible web • Allows a user to find a precise answer to a specific question • Allows a user to find webpages from a specific date or time. • Provides Full Version Softwares • Availability of Pro versions of Android and iOS Apps on Markets like Blackmart • Can aquire Banned Books and Applications • Access to Documentaries Movies and Propaganda videos Banned by Governments , even Youtube and Facebook is accessed in Countries where they are banned eg: Pakistan, Iran Gambia ,China etc.
  • 10.
    Accessing the Darknet DarknetContent can be accessed only through special anonymizing software called TOR. TOR Stands for The Onion Routing, it protects the user from being traced, as the name suggests it has layers of bouncing Addresses like layers of onion, so no one can either track the user or can know easily what the user viewed, browsed or even Purchased. The Darknet is a Big Market for illegal goods, it can be referred to as Chorbazar of Internet, and its market is so big that Amazon and Alibaba Together will appear a Dwarf if compared.
  • 11.
    How IT works? Only Graphical Representation
  • 12.
    Currency of theDeep Web Bitcoins an electronic cash system using peer-to-peer networking, digital signatures and cryptographic proof to enable irreversible payments between parties without relying on trust. Payments are issued and transferred by the Bitcoin network. Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one or more Bitcoin addresses. Bitcoin addresses are used for receiving Bitcoins, similar to how e-mail addresses are used for receiving e-mail. In April 2014, 1 BTC traded at around $4.80 (288 INR). Taking into account the total number of Bitcoins in circulation, the market capitalization of the Bitcoin network stands at over 40 million USD (2400 INR)
  • 13.
    Top Threats posesSedby DarkNet Threat #1: Free entry for any cybercriminal Anyone can choose to enter the darknet markets as a cybercriminal. There is no bar and this has been made largely possible with the expanding malware toolsets now available for the newbie. Threat #2: Drugs are available in plenty It is estimated that over 50 percent of the darknet markets that function using Tor offer narcotics for sale. These are easily accessible and are sure to incite interest among the ones that are ready to enter the world of drugs and cybercrime. Threat #3: No legislature in place for use of hidden
  • 14.
    Threat #4: Cybercrime-ChildPornography Though it is a fact that the financially and politiccally motivated often are involved in blackmailing,their actions are more challenging and they are harder to control. And since there is no boundation or limitation and certainly its impossible to impose censorship on contents on web, hence the major source of childpornography on the darkweb is the one of the biggest problem that government all over the six Continents are concerned about. Threat #5: Seamless terrorism and cybercrime The spread of cybercrime is inevitable and is, of course, hastened by the facilities provided by hidden services. The year 2015 saw the globalization of crime. With
  • 15.
    Child pornography Drugs Counterfeit goods Hackinginformation Politics Hardware/Software information Art Other/Unknown Share of Darknet Contents
  • 16.
    Conclusion •Darknet is Mostlyused for illegal activities, like Purchasing of Drugs, Arms, Selling of confidential Credential of hacked emails and other personal data. •It is Heaven of Hackers one must always be very careful while accessing the DarkNet, it is an ocean of Data with tons of Phishers in it. •Always be sure to have an authentic Netprotector while browsing Darknet. •If used safely and with the right intention it is an universe of Knowledge, waiting to be explored.
  • 17.
  • 18.

Editor's Notes

  • #2 Bijay Kumar Singh MCA 2nd Semester Roll No:01