The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The Internet is segmented further in the Deep Web—the content that it is not indexed and cannot access by traditional search engines. Dark Web considers a segment of the Deep Web. It accesses through TOR. Actors within Dark Web websites are anonymous and hidden. Anonymity, privacy and the possibility of non-detection are three factors that are provided by special browser such as TOR and I2P. In this paper, we are going to discuss and provide results about the influence of the Dark Web in different spheres of society. It is given the number of daily anonymous users of the Dark Web (using TOR) in Kosovo as well as in the whole world for a period of time. The influence of hidden services websites is shown and results are gathered from Ahimia and Onion City Dark Web’s search engines. The anonymity is not completely verified on the Dark Web. TOR dedicates to it and has intended to provide anonymous activities. Here are given results about reporting the number of users and in which place(s) they are. The calculation is based on IP addresses according to country codes from where comes the access to them and report numbers in aggregate form. In this way, indirect are represented the Dark Web users. The number of users in anonymous networks on the Dark Web is another key element that is resulted. In such networks, users are calculated through the client requests of directories (by TOR metrics) and the relay list is updated. Indirectly, the number of users is calculated for the anonymous networks.
References
[1]
Chertoff, M. and Simon, T. (2015) The Impact of the Dark Web on Internet Governance and Cyber Security. Centre for International Governance Innovation and Chatham House, 6, 1-18. https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf
[2]
Finklea, K. (2017) Dark Web. Congressional Research Service, Washington DC, 10 March 2017, 1-19. https://fas.org/sgp/crs/misc/R44101.pdf
[3]
Ilou, C., Kalpakis, G., Tsikrika, T., Vrochidis, S. and Kompatsiaris, I. (2016) Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web. Proceedings of the 11th IEEE International Conference on Availability, Reliability and Security, Salzburg, Austria, 15 December 2016, 1-6. https://doi.org/10.1109/ARES.2016.66
[4]
Park, A., Beck, B., Fletche, D., Lam, P. and Tsang, H. (2016) Temporal Analysis of Radical Dark Web Forum Users. Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), San Francisco, CA, USA, 880-883. https://doi.org/10.1109/ASONAM.2016.7752341
[5]
Berghel, H. (2017) Which Is More Dangerous—The Dark Web or the Deep State? Computer, IEEE Computer Society, 50, 86-91. https://doi.org/10.1109/MC.2017.215
[6]
Arora, M., Kanjilal, U. and Varshney, D. (2012) An Intelligent Information Retrieval: A Social Network Analysis. International Journal of Web Based Communities, 8, 213-222. https://doi.org/10.1504/IJWBC.2012.046263
[7]
Wu, P. and Li, S. (2011) Layout Algorithm Suitable for Structural Analysis and Visualization of Social Network. Journal of Software, 22, 2467-2475. http://pub.chinasciencejournal.com/JournalofSoftware/18611.jhtml https://doi.org/10.3724/SP.J.1001.2011.03896
[8]
Barnett, G. and Jiang, K. (2016) Resilience of the World Wide Web: A Longitudinal Two-Mode Network Analysis. Social Network Analysis and Mining, 6, 1-105.
[9]
Egoryan, L. (2015) New Fields for Web-Analysis: Social Network and Blogs. Auditor, 1, 43-48.
[10]
Davies, P. (2008) Information Technology. Oxford University Press, Oxford. https://www.worldcat.org/title/information-technology/oclc/374881000
[11]
Clifton, B. (2012) Advanced Web Metrics with Google Analytics. Wiley, Hoboken, NJ. https://www.wiley.com/en-us/Advanced+Web+Metrics+with+Google+Analytics%2C+3rd+Edition-p-9781118168448
[12]
Chen, H. and Yang, C. (2008) Intelligence and Security Informatics. Vol. 135, Springer, Berlin and Heidelberg, 1-460. https://www.springer.com/gp/book/9783540692072 https://doi.org/10.1007/978-3-540-69209-6
[13]
Yang, C., Mao, W., Zheng, X. and Wang, H. (2013) Intelligent Systems for Security Informatics. Academic Press, Cambridge, Massachusetts, United States, 1-250. https://www.elsevier.com/books/intelligent-systems-for-security-informatics/yang/978-0-12-404702-0
[14]
Jardine, E. (2015) The Dark Web Dilemma: Tor, Anonymity and Online Policing. Centre for International Governance Innovation and Chatham House, 20, 1-24. https://www.cigionline.org/sites/default/files/no.21.pdf
[15]
Baravalle, A., Lopez, M.S. and Lee, S.W. (2016) Mining the Dark Web—Drugs and Fake IDs. Proceedings of the 16th IEEE International Conference on Data Mining Workshops, IEEE, Barcelona, 12-15 December 2016, 350-356. https://doi.org/10.1109/ICDMW.2016.0056
[16]
Chen, H. (2012) Dark Web—Exploring and Data Mining the Dark Side of the Web. Springer, New York, Vol. 30, 1-454. https://www.springer.com/us/book/9781461415565
[17]
Yang, L., Liu, F., Kizza, J. and Ege, R. (2009) Discovering Topics from Dark Websites. Proceedings of the IEEE Symposium on Computational Intelligence in Cyber Security, Nashville, 1-5.
[18]
Zhang, Y., Zeng, S., Huang, C.N., Fan, L., Yu, X., Dang, Y., Larson, C., Denning, D., Roberts, N. and Chen, H. (2010) Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences. Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Vancouver, 23-26 May 2010, 1-6.
[19]
Tucker, P. (2015) How the Military Will Fight ISIS on the Dark Web, Defense One. 24 February 2015. https://www.defenseone.com/technology/2015/02/how-military-will-fight-isis-dark-web/105948/
[20]
Zetter, K. (2015) DARPA Is Developing a Search Engine or the Dark Web. Wired.com, 10 February 2015. https://www.wired.com/2015/02/darpa-memex-dark-web/
[21]
Pellerin, Ch. (2017) DARPA Program Helps to Fight Human Trafficking. Department of Defense, 24 January 2017. https://dod.defense.gov/News/Article/Article/1041509/darpa-program-helps-to-fight-human-trafficking/
[22]
Sciutto, J. (2015) Interview of Admiral Michael S. Rogers (Responding to a Question Concerning the IC’s Use of the Dark Web). New America Foundation Conference on Cybersecurity, Washington DC, 23 February 2015. https://www.nsa.gov/news-features/speeches-testimonies/Article/1619291/remarks-at-the-new-america-foundation-conference-on-cybersecurity/
[23]
Tucker, P. (2014) If You Do This, the NSA Will Spy on You. Defense One, 7 July 2014. https://www.defenseone.com/technology/2014/07/if-you-do-nsa-will-spy-you/88054/
[24]
The Intelligence Advanced Research Projects Activity (IARPA). IARPA Invests in “High-Risk, High-Payoff” Research Programs. IARPA and Office of the Director of National Intelligence. https://www.iarpa.gov/index.php/research-programs/hfc/38-about-iarpa
[25]
Homeland Security News Wire (2015) Cyber Researchers Need to Predict, Not Merely Respond to, Cyberattacks: U.S. Intelligence. Homeland Security News Wire, 9 March 2015. http://www.homelandsecuritynewswire.com/dr20150309-cyber-researchers-need-to-predict-not-merely-respond-to-cyberattacks-u-s-intelligence
[26]
The Intelligence Advanced Research Projects Activity (IARPA) (2015) Broad Agency Announcement: Cyber-Attack Automated Unconventional Sensor Environment (CAUSE). IARPA-BAA-15-06, 0-2, 17 July 2015. https://www.scribd.com/document/257104389/IARPA-Cyber-Attack-Automated-Unconventional-Sensor-Environment-CAUSE
[27]
Paganini, P. (2012) What Is the Deep Web? A First Trip into the Abyss. Security Affairs, 24 May 2012. https://securityaffairs.co/wordpress/5650/cyber-crime/what-is-the-deep-web-a-first-trip-into-the-abyss.html
[28]
Murphy, E.V., Murphy, M.M. and Seitzinger, M.V. (2015) Bitcoin: Questions, Answers, and Analysis of Legal Issues. Congressional Research Service, 1-36, 13 October 2015. https://fas.org/sgp/crs/misc/R43339.pdf
[29]
Bitcoin. Frequently Asked Questions—Find Answers to Recurring Questions and Myths about Bitcoin. https://bitcoin.org/en/faq#what-if-someone-bought-up-all-the-existing-bitcoins
[30]
Bitcoin. Protect Your Privacy. Bitcoin. https://bitcoin.org/en/protect-your-privacy
[31]
Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T. and Capkun, S. (2013) Evaluating User Privacy in Bitcoin. In: Sadeghi, A.R., Ed., Financial Cryptography and Data Security, FC 2013, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, Vol. 7859, 34-51. https://doi.org/10.1007/978-3-642-39884-1_4
[32]
Bitcoin. Some Bitcoin Words You Might Hear. Bitcoin. https://bitcoin.org/en/vocabulary
[33]
Bitcoin Wiki. Elliptical Curve Digital Signature Algorithm. Bitcoin Wiki. https://en.bitcoinwiki.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm
[34]
Bitcoin. Choose Your Bitcoin Wallet. Bitcoin. https://bitcoin.org/en/choose-your-wallet