Professional Documents
Culture Documents
Exploring The World of Deep and Dark Web
Exploring The World of Deep and Dark Web
Ms.Nikita Jain
Professor
Department of Computer Science
Indraprastha College For Women
University of Delhi
Email: jainnikita1010@gmail.com
Abstract—There exists a world, far beyond the imagination like Facebook, Instagram and Snapchat all lie under surface
of the common folks, which remains invisible from the tangible web. Whether we use apps on our phones or watch videos on
world. This brings in the concept of Deep and Dark web. These Netflix, we are accessing the surface web. Even the torrents
webs are used by individuals to go invisible. They require a
special browser like The Onion Router (TOR) because these we download come under surface web. Even though we use
cannot be accessed using normal search engines like Google, all these to a very great extent in our day-to-day lives, we still
Yahoo, etc. TOR helps in keeping the location of the user are using a very small portion of about 3%to 5%of the whole
anonymous by bouncing connected computer’s IP address to web (see Fig 1). [1]
volunteer nodes where it hides the IP address under many
layers, like an ‘onion’. This paper discusses terms like Bitcoin
and Silk Road and how closely they are linked with the dark
web. A comprehensive study of Deep web and Dark web has
been carried out to find out how deep web can be used for
the welfare of the society. The paper also mentions some case
studies and measures(in the the form of acts/policies) taken by
the government to deal with misuse of either of these webs.
A systematic survey was also conducted to know how much
awareness do people have about deep and dark web.
Index Terms—Web, Deep web, Dark web, TOR
I. I NTRODUCTION
th
Since the 20 century, human beings are using web. Have
you ever wondered how much percentage of the web you
have used until now? The answer to this question is truly
very surprising. We have around 4.5 thousand millions of web
browsing people in the world [1] but only a fraction of people
would have at most used 7%to 9%of the web. These statistics
are just a rough estimate and the actual figures might vary.
But it does give us an idea of how we are still left with tons Fig. 1. Bifurcation of Web
of information that needs to be discovered.
We asked the targeted audience in our survey if they know Knowing that fact makes it very intriguing what all lies
about deep and dark web, and we were suprised to know that under the major part that we are unaware of.
only 47.1%knew about it. Also, we asked them if how many For the satisfaction of this curiosity, it is required to do an
people have used either of these web. Only 5.7%have used in-depth study of deep and dark webs. Through this paper,we
either of these webs. would be covering certain topics that are very intriguing.
The whole web is divided into sub-parts. These sub-webs There is a detailed analysis of The Onion Router(TOR),
are Surface web, Deep web and Dark web. The surface web is Bitcoin, and Silkroad. With that being discussed, the paper
the one that most of the population uses. From search engines will be mentioning some of the case studies related to both
like Google, Yahoo, Bing, and Quora to social media websites the webs and the steps taken by certain governments for the
welfare of their country. Hereinafter, the future perspective and information, organizing political activities, selling of drugs,
conclusion would be followed. weapons, and stolen credit card numbers, etc.
In our survey, we asked our surveyees if they have heard of
A. Deep Web TOR browser and only 26.9%gave a positive response.
The deep web or the ”hidden web”, as many like to call it, is 1) Onion Routing: Onion Routing is what enables tor to
a part of the web whose contents are not indexed by standard offer so much anonymity and privacy to its users. We know
web search crawlers. Hence, we cannot access the deep web that information travels across the internet in the form of
just by using Google or Bing. We need a special browser called packets. In Tor, these packets have to follow a path established
TOR or Freenet to access the deep web. Since the deep web by Tor, consisting of randomly assigned nodes, to reach their
provides much-needed privacy and anonymity, it has become destination. Your journey to a deep web page stars from your
a haven for harboring all the criminal activities like the illegal computer, i.e, the originator. The first node of the circuit,
selling of drugs, weapons, etc. But the original purpose of i.e, the entry point of the circuit, receives the IP address of
designing deep web wasn’t to enable such illegal activities to your computer and knows that your computer sent a message
flourish and prosper, it was made to fulfill the need for secure using Tor and it needs to forward that message to the second
communications and to escape censorship to guarantee free node. The second node then receives the encrypted message
speech to the people. Apart from these activities, the deep and establishes a connection with the first node. It can’t read
web is also used by many people who want to communicate the message because there is still one layer of encryption
their ideas and opinions without having the government to left. Also, the second node cannot determine whether the first
keep a check on them and by many whistleblowers who want note is the originator or just another node in the circuit. The
to share confidential information to the journalists without originator can then send a message via the first and second
leaving any trail. Also, the majority of the deep web sites node to a third node( or the exit node) encrypted such that
are dedicated to ordinary topics like political/personal blogs, only the exit node is able to decrypt it. The exit node knows
discussion forums, and even radio stations. Almost all the what the messages say because it has two to peel off the final
felonious activities that take place are on the dark web, which layer of encryption while it doesn’t know where the message
is a very small fraction of the deep web. came from originally. The exit node then creates a connection
to the webserver where our target page is located. The web
B. Dark Web server only knows the IP address of the exit node. In this way,
The dark web is a network of untraceable (invisible from the the source device remains anonymous. [6]
outside world) online websites on the Internet. They cannot be
accessed using normal search engines and to access them we
need to use software like The Onion Router. It is used by a lot
of people to keep their activities hidden. The government uses
the dark web to hide their secret official records. Criminals
and terrorists use it for smuggling weapons, drugs, and other
illegal things while being on a private anonymous network so
that their illegal work cannot be traced. Even trafficking and
stalking are being done on a very large scale here. But despite
all these inappropriate uses, there also exists a legitimate side.
For example, People here join Book clubs and gain access
to a boundless world of information that is not accessible
through the surface web. As the name suggests, the dark web
is not safe. Accessing the internet through a TOR network can
expose the users to a large number of advanced hackers in just
a fraction of minutes.