Dark Web – the modern threat for the Internet Security

Slides:



Advertisements
Similar presentations
Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
Dark net . . Invisible Web . . Hidden Web . .
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
11 October HTML: Links and Forms. Agenda News: William Knight Review of HTML Pages Meeting sheet passed HTML Links Networking and the Internet HTML Forms.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Proxy Servers.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Security fundamentals Topic 10 Securing the network perimeter.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
CNNIC Chinese Domain Name Registration System Zhang Wenhui CNNIC China Internet Network Information Center.
59th IETF Seoul, Korea Quarantine Model Overview “Quarantine model overview for ipv6 network security” draft-kondo-quarantine-overview-00.txt Satoshi kondo.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
SEC.FAIL Information Security Defense Lab Setup. SEC.FAIL Instructions Each team will need to operate on a separate system profile. For the labs, you.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Security fundamentals
Securing Information Systems
The Argument against Regulation The Argument for Regulation
Tor Good + Evil.
Domain Name System DNS - A system for converting host names and domain names into IP addresses on the Internet or on local networks that use the TCP/IP.
Introduction To Internet And Web Mr. Zeeshan Ali, Asst. Professor
The Onion Router Hao-Lun Hsu
11 October Building a Web Site.
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
IPv6 – THE WAY TO THE SECURE INTERNET
Deep and Dark on the Web By: Todd Careless.
IP Adressing in IPv4 By Kenneth Lundby.
Practical Censorship Evasion Leveraging Content Delivery Networks
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Deep and Dark on the Web By: Jim Martin.
Providing Network Services
Exercise ?: TOR.
Network Security: IP Spoofing and Firewall
Dark Web, I2P, and Deep Web Team 5
* Essential Network Security Book Slides.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Introduction to the Internet and Web
Alex Guy packets (stars) tor routers users web servers (squares)
Unit 2 The Web Book Test.
Many dark web constructs. The most notorious/popular is Tor/Onion.
The dark web By Riley. Sampare.
Cyber Security Challenges
Cyber security and Computer Misuse
Unit-3.
The Internet: Encryption & Public Keys
Protocol Application TCP/IP Layer Model
How does the deep web work?
INTRODUCTION TO THE INTERNET AND WEB
SECURITY IN THE DIGITAL AGE
Outline The concept of perimeter defense and networks Firewalls.
Crime Behind The Keyboard(Dark Web)
Presentation transcript:

Dark Web – the modern threat for the Internet Security Alexander Nevalenniy

What is the Dark Web? 1. P2P networks (TOR, I2P) 2. To connect to it you need a special soft or use special settings for your softs 3. Anonymous job 4. Usually it uses non-ICANN addresses and domain names (.onion, .i2p)

TOR. How does it work?

I2P. How does it work?

Statistic about Dark Web. Dark Web is part of Deep Web (closed systems like Digital Banking, etc), and has a small part of last one Deep Web has about 96% information of all the Internet and 500 times larger than it (SANS Institute assessment) That means Dark Web consists about 1 % information of all the Internet. And what kind of information does it have? Drugs Human traffic Illegal porno Terrorist groups’ activity etc.

Increase of non-ICANN domains According to the University of Surrey’s Professor Alan Woodman the number of Tor .onion sites on the dark web spiked to over 60,000 sites from the original 35,000 sites in 2016.

Is it a serious treat? If the Internet consists more 1% of all information related with crimes? Maybe not. However, for example, in 2017 police arrested men in 4$ billion Bitcoin money laundering shame. WannaCry and NotPetya (command servers were on TOR) made damage cost about 5$ billion in 2017 around the world (only one attack). Budget of UN is 5.4$ billion dollars. For example, GDP of Belarus is 50$ billion dollars, GDP of Germany is 3400$ billion dollars. All cyber crimes connected with Dark Web in one year can cost sum of GDP of some countries or US army budget. It is very expensive.

What is the real problem? The Internet has a lot of vulnerabilities connected not with systems, network equipment but with technologies!!! A lot of protocols make good exchange of the data but do not defense the critical system in general. That means we can not identify users just because of weakness of technologies (like NAT, SOCKS5, HTTP, etc.).

How to solve it? Implementation of new RFC. Strict identification of users. Regulation of the Internet.