Escolar Documentos
Profissional Documentos
Cultura Documentos
Deep Web
The Underworld of Cyberworld
While the world is thriving on the
enormous possibilities and expansions
that Internet can provide to us in the years
to come, there is a hidden universe that
exists behind this technology. It will be apt,
if I say its Underworld of Cyberworld.
Tor aims to conceal its users' identities and their network activity
from surveillance and traffi c analysis by separating identi
cation and routing. It is an implementation of onion routing,
which encrypts and then randomly bounces communications
through a network of relays run by volunteers around the globe.
security professionals to understand
how stolen identities and credit cards
are used, how products are fenced or
distributed illegally, and more. Unless until
we understand about this hidden activity,
we cannot develop any counter measure
techniques to prevent it. So objective of
this article is to spread the awareness in
the computer professional society, and
igniting the professionals to come out with
their novel ideas to combat it.
A journey into the darker side of
A journey into the darker side of the internet starts with two
open source programs: A Tor browser and Bitcoin. Tor browser
gives platform to the user for anonymous communication, and
Bitcoin work as an online currency for nancial transaction for
illicit purpose.
Objectives of TOR
The Tor protects a common form of
Internet surveillance known as "traffic
analysis." Traffic analysis can be used
to infer who is talking to whom over a
public network. Knowing the source and
destination Internet traffic allows others
to track behavior and interests of users.
As we know Internet data packets
have two parts: a data payload and a
header used for routing. The data payload
works on the principle that whatever
is being sent, whether that's an email
message, a web page, or an audio le.
Even if you encrypt the data payload of
your communications, traffic analysis still
reveals a great deal about what you're
doing and, possibly, what you're saying.
That's because it focuses on the header,
which discloses source, destination, size,
timing, and so on.
A basic problem for the privacy is that
the recipient of your communications can
see that you sent it by looking at headers,
www.csi-india.org
Tor Servers are now the norm for storing, accessing ,and hiding
illicit activity. Tor's Hidden Servers provide a real insight to an
underground world that once was limited to dark alleys, shady
places, and dangerous criminals.
is conrmed, you can transfer any amount
from your personal bank to Dwolla.
Next you need to set up an account
with the Bitcoin exchanger e.g. MtGox.
After your Dwolla transfer moves to
MtGox, you can use the money to
purchase Bitcoins on the open market for
a small percentage-based fee. Once this
sale is complete, your Bitcoins are best
stored in your own bank account that is
residing digitally on your computer. Now
you are ready to go shopping on the black
market.
Combination of Tor and Bitcoin has
unfortunately served all the purpose of
cyber criminals. Tor Servers are now the
norm for storing, accessing ,and hiding
illicit activity. Tor's Hidden Servers provide
a real insight to an underground world
that once was limited to dark alleys,
shady places, and dangerous criminals.
Much like the internet has expanded our
e-commerce into a borderless global
market, Bitcoins and Tor have made
shopping for illicit goods and services
Conclusion
Anonymity has given wings to the cyber
criminals and anonymous digital cash
becomes their strength. The technology
like Tor and Bitcoin has added a potential
threat in cyber community. These are
the new challenges for which adequate
monitoring mechanism should be
developed. We accept that somewhere
anonymity is necessary ,but we should
try to develop a mechanism that unsocial
elements should not be able to use for
illegal activity.
References
[1] Jacob Appelbaum. Tor and NAT
devices: increasing bridge & relay
reach ability or, enabling the use
of NAT-PMP and UPnP by default.
Technical Report 2012-08-001, The
Manish Kumar is working as Assistant Professor in Department of Master of Computer Applications, M. S. Ramaiah
Institute of Technology, Bangalore, India. His specialization is in Network and Information Security and Computer
Forensic. He has worked on the R&D projects related on theoretical and practical issues about a conceptual framework
for E-Mail, Web site, and Cell Phone tracking, which could assist in curbing misuse of Information Technology and
Cyber Crime. He is also the president of International Association of Cyber Crime Prevention (India Chapter).
Dr. M Hanumanthappa is currently working as Associate Professor in the Department of Computer Science and
Applications, Bangalore University, Bangalore, India. He has over 15 years of teaching (Post Graduate) as well as
Industry experience. He is member of Board of Studies /Board of Examiners for various Universities in Karnataka,
India. He is actively involved in the funded research project and guiding research scholars in the eld of Data Mining
and Network Security.
Dr. T V Suresh Kumar is working as Professor and Head, Department of Master of Computer Applications and Registrar
(Academic), M S Ramaiah Institute of Technology, Bangalore. He has delivered lectures at various organizations
like Honeywell, SAP Labs, Wipro Technologies, DRDO, Mphasis, Indian Institute of Science (Procience), HCL
Technologies, L&T Infotech, Nokia and various Universities/Academic Institutions. He is actively involved in R&D
projects. He has published several research papers in various National and International Conferences and Journals.
I had plenty of pimples as a kid. One day I fell asleep in the library. When I woke up, a blind man was reading
my face.
~ Rodney Dangereld