A RESEARCH ON COUNTERING TERRORISM ACTIVITIES THROUGH DARK WEB ANALYSIS: PREVENTION TO FUTURE ATTACK

Page 1

Aryaman Kaushik, International Journal of Advanced Trends in Computer Applications (IJATCA) Special Issue 1 (2), April - 2020, pp. 27-31 ISSN: 2395-3519

International Journal of Advanced Trends in Computer Applications www.ijatca.com

A RESEARCH ON COUNTERING TERRORISM ACTIVITIES THROUGH DARK WEB ANALYSIS: PREVENTION TO FUTURE ATTACKS 1

Aryaman Kaushik, 2Rohini Sharma 1 Student Department of CSE Chandigarh University, Gharuan 2 Assistant Professor Department of CSE Chandigarh University, Gharuan

1

19bcs1053@gmail.com, 2rohinie7721@cumail.in

Abstract: The dark web also called undetectable web or hidden web are portions of the World Wide Web and its substance are not recorded by standard web crawlers for any kind of reason. Basic uses of the Dark web will be web mail and internet banking yet they are additionally paid for administrations with a paywall, for example, on request video and numerous others. Everybody who utilizes the Web for all intents and purposes visits what could be reflected as Deep Web destinations consistently without known. The contents of the Dark web are holed up behind HTML structures. The surface web is the contrary term to the Dark web. A spot where entire areas of web inside which the entirety of the sites are escaped the perspective on customary web surfers, and furthermore in which the individuals utilizing them are avoided see is eluded as Dark web. Dark web is the mysterious web where it is a lot of hard for programmers, spies or government offices to follow web clients and examine which sites they are utilizing and what are they doing there.

Keywords: Terrorism, web, HTML, Deep Web.

I. INTRODUCTION The terms Deep Web, Deep Net, Invisible Web or Dark Web allude to the substance on the World Wide Web that isn't listed by standard web crawlers. One can portray the Internet as made out of layers: the "upper" layer, or the Surface Web, can undoubtedly be gotten to by standard pursuits or guiding your internet browser to a realized site address. Be that as it may, "further" layers, the substance of the Deep Web, are not filed by conventional web search tools, for example, Google. The most profound layers of the Deep Web, a portion known as the "Dark Web," contain content that has been deliberately disguised. To get to material in the Dark Web, people utilize extraordinary programming, for example, TOR (The Onion Router) or I2P (Invisible Internet Project). TOR was at first made by the U.S. Maritime Research Laboratory as a device for secretly imparting on the web. It depends upon a system of volunteer PCs to course clients' web traffic through a progression of

other clients' PCs with the goal that the traffic can't be followed to the first client. An ongoing report found that 57% of the Dark Web is involved by an unlawful substance like sex entertainment, illegal accounts, sedate centre points, weapons dealing, fake money, fear monger correspondence, and considerably more. Dark web investigation is a significant perspective in the field of counter-fear mongering (CT). In the present situation, fear-based oppressor tackles are the greatest issue for humankind and the entire world is under steady risk from these very much arranged complex and composed psychological militant tasks. Psychological warfare has become the most noteworthy danger to national security on account of its capability to carry gigantic harm to our foundation, economy, and individuals. The Dark net probably won't be inherently criminogenic—it doesn't normally expand crimes; rather it may very well be another apparatus that is utilized by certain people to complete illegal exercises. Some key qualities of the Dark net, including its unknown nature,

www.ijatca.com

27


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
A RESEARCH ON COUNTERING TERRORISM ACTIVITIES THROUGH DARK WEB ANALYSIS: PREVENTION TO FUTURE ATTACK by IJATCA - Issuu