SlideShare a Scribd company logo
RESEARCH INTHE
DEEPWEB
Outline
■ The SurfaceWebVS the Deep Web
■ DeepWeb vs DarkWeb
■ How to get deeper
■ DarkWeb access
■ Tools
SurfaceWeb
Anything that can be indexed by a
typical search engine.
Research in the deep web
Research in the deep web
Research in the deep web
DeepWeb
■ Quality content is 1,000 to 2,000 times greater than surface web
■ 95% of DeepWeb is accessible to public (no fees or subscription required)
■ The deep web is the internet that has not been indexed by commercial search engines such as Google and
Yahoo!.These search engines send out crawlers or spiders to index and catalog available web sites, but the
vast majority of the internet, 500X the surface net, includes many of the best resources which are not
indexed by these search engines. Such as:
– Unlinked pages:Spiders can’t find web pages that are not linked to others.
– Private intranets and web pages, password protected and more.
– Non HTML content: e.g., content rich, lots of different file type
– Library & Government Databases -How StuffWorks.com
Types of deep web
■ InvisibleWeb: Material that can be, but is not included in search engine results. EG:
new material added and not yet picked up.
■ PrivateWeb: Sites intentionally excluded from search engine results. Ex: password
protected
■ Subscriptions websites & databases: ESPN Insider, (Library Databases) Proquest
databases, EbscoHost. -How StuffWorks.com
How to get deeper
■ Directories
– http://www.dmoz.org/
■ Specialized Search Engines
– http://biznar.com/biznar/desktop/en/search.html
– http://www.wolframalpha.com/
– http://archive.org/web/web.php
■ Academic Databases
– Jstor
– Science Direct
■ Specialized Databases
– https://www.archives.gov/
■ GovernmentWebsites
– https://www.data.gov/
– https://www.govinfo.gov/
The DarkWeb
■ The Dark web: An area of the web which information is hidden deep and anonymously.
■ The DarkWeb then is a small portion of the DeepWeb that has been intentionally
hidden and is inaccessible through standard web browsers.
"The deepWeb may be a shadow land of untapped potential, but with a bit of skill and
some luck, you can illuminate a lot of valuable information that many people worked to
archive. On the dark Web, where people purposely hide information, they'd prefer it if
you left the lights off.
The dark Web is a bit like the Web's id. It's private. It's anonymous. It's powerful. It
unleashes human nature in all its forms, both good and bad.
The bad stuff, as always, gets most of the headlines.You can find illegal goods and
activities of all kinds through the dark Web.That includes illicit drugs, child pornography,
stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted
media and anything else you can think of.Theoretically, you could even, say, hire a hit
man to kill someone you don't like.
But you won't find this information with a Google search.These kinds ofWeb sites
require you to use special software, such asThe Onion Router, more commonly known
asTor.
Tor is software that installs into your browser and sets up the specific connections you
need to access dark Web sites.Critically,Tor is an encrypted technology that helps
people maintain anonymity online. It does this in part by routing connections through
servers around the world, making them much harder to track." -How StuffWorks.com
Research in the deep web
“Tor is a program you can run on your computer that helps keep you safe on
the Internet. It protects you by bouncing your communications around a
distributed network of relays run by volunteers all around the world: it
prevents somebody watching your Internet connection from learning what
sites you visit, and it prevents the sites you visit from learning your physical
location.This set of volunteer relays is called the Tor network (Tor Project)”
HowTor works
■ TheTor network is a volunteer-operated servers that individuals use to improve
privacy and security.
■ Tor connects through masked virtual links instead of a direct connection.
■ Tor directs Internet traffic through a free, worldwide, volunteer network consisting of
more than seven thousand relays to conceal a user's location and usage from anyone
conducting network surveillance or traffic analysis (How StuffWorks).
The Onion Router
“Onion routing is a technique for anonymous communication over a computer network. In
an onion network, messages are encapsulated in layers of encryption, analogous to layers
of an onion.The encrypted data is transmitted through a series of network nodes called
onion routers, each of which "peels" away a single layer, uncovering the data's next
destination.When the final layer is decrypted, the message arrives at its destination.The
sender remains anonymous because each intermediary knows only the location of the
immediately preceding and following nodes” (Tor (anonymity network)
Hidden Service
“Tor makes it possible for users to hide their locations while offering various kinds of
services, such as web publishing or an instant messaging server. UsingTor "rendezvous
points," otherTor users can connect to these hidden services, each without knowing the
other's network identity (Tor project).”
Research in the deep web
Research in the deep web
Research in the deep web
Research in the deep web
Research in the deep web
Research in the deep web
Research in the deep web
Why
■ Privacy
– Protect from traffic analysis
■ Traffic analysis is the process of intercepting and examining messages in order to deduce
information from patterns in communication. It can be performed even when the messages
are encrypted and cannot be decrypted.
– Personal Privacy from government privacy abuse
– Identity thieves
– Unscrupulous marketers
– Protect communication from corporations
– Skirt censorship
■ Whistleblowing & news leaks
– Chinese journalist communicate onTor
Tips
■ 1.) Don’t Download anything.
■ 2.) Don’t go to illegal sites (Duh).
■ 3.) Never pay with any credit card.
■ 4.) However, if you are going to use it because of personal privacy concerns, also be
aware of the dangerous e.g., illegal material, viruses, and slow websites!
References
■ How the DeepWebWorks:
http://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm
■ Who usesTor:
https://www.torproject.org/about/torusers.html.en
■ Tor (anonymity network)
https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29

More Related Content

ODP
The Deep and Dark Web
PPTX
The Dark Web
PPTX
Investigating Using the Dark Web
PPTX
Dark web
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Deep web and Dark web
PPTX
Deep web
PPTX
The dark web
The Deep and Dark Web
The Dark Web
Investigating Using the Dark Web
Dark web
The Deep Web, TOR Network and Internet Anonymity
Deep web and Dark web
Deep web
The dark web

What's hot (20)

PPTX
Dark Web and Privacy
PPTX
Dark wed
PPTX
Introduction To Dark Web
PPTX
Guide to dark web
PPTX
Deepweb and darkweb vinodkumar ancha
PPTX
Dark web by Pranesh Kulkarni
PPTX
The Dark Web : Hidden Services
PPTX
Deep Web - what to do and what not to do
PPTX
The Dark side of the Web
PPTX
Social engineering
PPTX
The dark web
PPTX
Cybersecurity and the DarkNet
PPTX
Ali shahbazi khojasteh - deep web
PPT
Darknet
PPTX
PPT on Phishing
PDF
Deep Dark Web - How to get inside?
PPTX
Illuminating the dark web
PPTX
Deep Web
PPTX
Deep web and dark web
PPTX
Dark and Deep web
Dark Web and Privacy
Dark wed
Introduction To Dark Web
Guide to dark web
Deepweb and darkweb vinodkumar ancha
Dark web by Pranesh Kulkarni
The Dark Web : Hidden Services
Deep Web - what to do and what not to do
The Dark side of the Web
Social engineering
The dark web
Cybersecurity and the DarkNet
Ali shahbazi khojasteh - deep web
Darknet
PPT on Phishing
Deep Dark Web - How to get inside?
Illuminating the dark web
Deep Web
Deep web and dark web
Dark and Deep web
Ad

Viewers also liked (20)

PPTX
Deep and Dark Web
PDF
Scuba diving into The Deep Dark Web
PPTX
The Dark Web
PDF
Cybercrime In The Deep Web
PPT
Deep Web
PDF
Subject liaison model
PDF
Teaching Innovation at Georgia Tech
PPTX
ACRL statistical literacy
PDF
UAH information literacy
PDF
Charleston poster session
PPTX
The collective
PDF
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
PDF
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
PPTX
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PPTX
The dark net illescas ecommer_k32
PDF
The "whatever" Web
DOCX
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
PDF
Rolling in the Deep. ISACA.SV.2016
Deep and Dark Web
Scuba diving into The Deep Dark Web
The Dark Web
Cybercrime In The Deep Web
Deep Web
Subject liaison model
Teaching Innovation at Georgia Tech
ACRL statistical literacy
UAH information literacy
Charleston poster session
The collective
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
The dark net illescas ecommer_k32
The "whatever" Web
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
Rolling in the Deep. ISACA.SV.2016
Ad

Similar to Research in the deep web (20)

PPTX
Deep web, the unIndexed web
PPTX
.Onion
PPTX
Tor: The Second Generation Onion Router
PDF
Introduction to Deep Web
PPTX
Invisible Web
PPTX
Osint - Dark side of Internet
PPTX
Dark Web
PPTX
Dark web technology based ppt for power pt
PPTX
Deep Web
PPTX
PPTX
Dark web
PPTX
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
PPTX
Understand Internet Before You Regret.
PPTX
The Hidden Web
PPTX
Journey To The Dark Web
PPTX
Cyber crime- a case study
PPTX
Deep web
PDF
PPTX
The Dark Web
Deep web, the unIndexed web
.Onion
Tor: The Second Generation Onion Router
Introduction to Deep Web
Invisible Web
Osint - Dark side of Internet
Dark Web
Dark web technology based ppt for power pt
Deep Web
Dark web
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Understand Internet Before You Regret.
The Hidden Web
Journey To The Dark Web
Cyber crime- a case study
Deep web
The Dark Web

More from Seth Porter, MA, MLIS (20)

PPTX
Georgia Tech Library Information Literacy Program-First Year Experience
PPTX
GT1000 training IL
PPTX
Program evaluation instead of assessment AABIG
PPTX
PPTX
Georgia Tech teaching best practices
PDF
Accessing government statistical information online
PDF
Engaging Design and Learning
PPTX
Green, Gold, and the red white and blue: using open access and government inf...
PDF
Curriculum Mapping Conference AABIG 2016
PPTX
USG teaching & Learning Conference
PPTX
Introduction to Nvivo
PPTX
Green, gold, uncle sam, and information literacy
PPTX
Human cognition and aesthetic design in pedagogy and online learning
PPTX
Instruction bootcamp
PPTX
Graduate introduction INTA
PPTX
Economics introduction
PPTX
Economics introduction and data access
PPTX
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
PPTX
Space, Place, and Information Literacy
PPTX
Education policy and Civic Engagement: My Capstone
Georgia Tech Library Information Literacy Program-First Year Experience
GT1000 training IL
Program evaluation instead of assessment AABIG
Georgia Tech teaching best practices
Accessing government statistical information online
Engaging Design and Learning
Green, Gold, and the red white and blue: using open access and government inf...
Curriculum Mapping Conference AABIG 2016
USG teaching & Learning Conference
Introduction to Nvivo
Green, gold, uncle sam, and information literacy
Human cognition and aesthetic design in pedagogy and online learning
Instruction bootcamp
Graduate introduction INTA
Economics introduction
Economics introduction and data access
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Space, Place, and Information Literacy
Education policy and Civic Engagement: My Capstone

Recently uploaded (20)

PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Types and Its function , kingdom of life
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Institutional Correction lecture only . . .
PDF
RMMM.pdf make it easy to upload and study
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
master seminar digital applications in india
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Classroom Observation Tools for Teachers
Cell Types and Its function , kingdom of life
Complications of Minimal Access Surgery at WLH
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Institutional Correction lecture only . . .
RMMM.pdf make it easy to upload and study
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
master seminar digital applications in india
TR - Agricultural Crops Production NC III.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
VCE English Exam - Section C Student Revision Booklet
STATICS OF THE RIGID BODIES Hibbelers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf

Research in the deep web

  • 2. Outline ■ The SurfaceWebVS the Deep Web ■ DeepWeb vs DarkWeb ■ How to get deeper ■ DarkWeb access ■ Tools
  • 3. SurfaceWeb Anything that can be indexed by a typical search engine.
  • 7. DeepWeb ■ Quality content is 1,000 to 2,000 times greater than surface web ■ 95% of DeepWeb is accessible to public (no fees or subscription required) ■ The deep web is the internet that has not been indexed by commercial search engines such as Google and Yahoo!.These search engines send out crawlers or spiders to index and catalog available web sites, but the vast majority of the internet, 500X the surface net, includes many of the best resources which are not indexed by these search engines. Such as: – Unlinked pages:Spiders can’t find web pages that are not linked to others. – Private intranets and web pages, password protected and more. – Non HTML content: e.g., content rich, lots of different file type – Library & Government Databases -How StuffWorks.com
  • 8. Types of deep web ■ InvisibleWeb: Material that can be, but is not included in search engine results. EG: new material added and not yet picked up. ■ PrivateWeb: Sites intentionally excluded from search engine results. Ex: password protected ■ Subscriptions websites & databases: ESPN Insider, (Library Databases) Proquest databases, EbscoHost. -How StuffWorks.com
  • 9. How to get deeper ■ Directories – http://www.dmoz.org/ ■ Specialized Search Engines – http://biznar.com/biznar/desktop/en/search.html – http://www.wolframalpha.com/ – http://archive.org/web/web.php ■ Academic Databases – Jstor – Science Direct ■ Specialized Databases – https://www.archives.gov/ ■ GovernmentWebsites – https://www.data.gov/ – https://www.govinfo.gov/
  • 10. The DarkWeb ■ The Dark web: An area of the web which information is hidden deep and anonymously. ■ The DarkWeb then is a small portion of the DeepWeb that has been intentionally hidden and is inaccessible through standard web browsers.
  • 11. "The deepWeb may be a shadow land of untapped potential, but with a bit of skill and some luck, you can illuminate a lot of valuable information that many people worked to archive. On the dark Web, where people purposely hide information, they'd prefer it if you left the lights off. The dark Web is a bit like the Web's id. It's private. It's anonymous. It's powerful. It unleashes human nature in all its forms, both good and bad. The bad stuff, as always, gets most of the headlines.You can find illegal goods and activities of all kinds through the dark Web.That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted media and anything else you can think of.Theoretically, you could even, say, hire a hit man to kill someone you don't like. But you won't find this information with a Google search.These kinds ofWeb sites require you to use special software, such asThe Onion Router, more commonly known asTor. Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites.Critically,Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track." -How StuffWorks.com
  • 13. “Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.This set of volunteer relays is called the Tor network (Tor Project)”
  • 14. HowTor works ■ TheTor network is a volunteer-operated servers that individuals use to improve privacy and security. ■ Tor connects through masked virtual links instead of a direct connection. ■ Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis (How StuffWorks).
  • 15. The Onion Router “Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion.The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination.When the final layer is decrypted, the message arrives at its destination.The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes” (Tor (anonymity network)
  • 16. Hidden Service “Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. UsingTor "rendezvous points," otherTor users can connect to these hidden services, each without knowing the other's network identity (Tor project).”
  • 24. Why ■ Privacy – Protect from traffic analysis ■ Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. – Personal Privacy from government privacy abuse – Identity thieves – Unscrupulous marketers – Protect communication from corporations – Skirt censorship ■ Whistleblowing & news leaks – Chinese journalist communicate onTor
  • 25. Tips ■ 1.) Don’t Download anything. ■ 2.) Don’t go to illegal sites (Duh). ■ 3.) Never pay with any credit card. ■ 4.) However, if you are going to use it because of personal privacy concerns, also be aware of the dangerous e.g., illegal material, viruses, and slow websites!
  • 26. References ■ How the DeepWebWorks: http://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm ■ Who usesTor: https://www.torproject.org/about/torusers.html.en ■ Tor (anonymity network) https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29