Dark Web, I2P, and Deep Web Team 5

Slides:



Advertisements
Similar presentations
Lecture 6/2/12. Forms and PHP The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input When dealing with HTML forms.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
DARKNET.
Dark net . . Invisible Web . . Hidden Web . .
Network Layer and Transport Layer.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Internet Basics.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks QUME 185 Introduction to Computer Applications.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Proxy Servers.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Ethernet, WiFi & Protocols
Go to youtube and search “Code.org internet videos”
Anonymous Internet Protocols
Onions and Garlic: the protocols of I2P
How Works Ameera Al Ghamdi ID:
Virtual Private Networks
The Onion Router Hao-Lun Hsu
The Hidden face of the Darknet
What is the Internet? © EIT, Author Gay Robertson, 2016.
McGraw-Hill Technology Education
Tor Internals and Hidden Services
Anonymous Communication
What's the buzz about HORNET?
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Exercise ?: TOR.
Dark Web, Deep Web, and I2P Dante Taylor, Dayton Chamberlin, Kade Randall, Trevor, Tanner, Harshit Joshi, Troy.
CS222 Web Programming Course Outline
Topic 5: Communication and the Internet
Chapter 6 Networks Communicating and Sharing Resources
By: Jonathan Cardwell, Mark Fredricks, Ryan Vina and Jake Leiper
0x1A Great Papers in Computer Security
Firewalls Routers, Switches, Hubs VPNs
What is the World Wide Web (www)
Anonymous Communication
The Internet and the World Wide Web
Computer communications
E-commerce Infrastructure
The Internet CSCI 101.
Communications & Computer Networks Resource Notes - Introduction
Kharavets Dmitriy, group №641301
How Works Ameera Al Ghamdi ID:
Protocols 2 Key Revision Points.
Anonymity (Privacy) Suppose you are surfing the Web.
Internet Basics Videos
Introduction to Network Security
Bruce Maggs relying on materials from
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
How does the deep web work?
Bruce Maggs relying on materials from
Wolves of the Internet: Where do fraudsters hunt for data online?
Presentation transcript:

Dark Web, I2P, and Deep Web Team 5 Daniel Childers, Chase Cossairt, Gregor Haas, Noah Holcombe, April Simon, Quinten Whitaker

History 2002: TOR publicly released 2003: I2P enters beta Developed by US government: United States Naval Research Laboratory, DARPA Still mostly funded by US government Today, millions of users 2003: I2P enters beta I2P: Invisible Internet Project Similar to TOR but uses “garlic” routing instead of “onion” routing

What is the Deep Web? The part of the world wide web not indexed by search engines. Also referred to as invisible web, hidden web, and the undernet. Content hidden behind http forms Must know a URL or IP address, and sometimes have access permission such as a password and identification to access.

Deep Web - How large is it? Makes up approximately 99% of the internet Surface web has over 4.5 billion websites indexed Deep web is estimated to be 400 to 500 times larger than the surface web Growing faster than the surface web

Deep Web (cont) Examples Online Banking Content locked behind a paywall such as Netflix Emails Social Media Profiles

Dark Web Only accessible through alternative web browsers: TOR browser Ensures anonymous browsing, which is important for: Whistleblowers (Edward Snowden) Journalists LEO and military Most commonly used for: Anonymous tips (Panama papers) And more recently...

Dark Web (continued) Uses changed as other technologies developed: Cryptocurrencies, public key cryptography → dark web ‘markets’ First of these was Silk Road, created by ‘Dread Pirate Roberts’ (Ross Ulbricht) Sold illegal goods such as drugs and weapons, usually delivered through mail Ulbricht arrested on 2nd October, 2013; sentenced to life in prison w/o parole After Silk Road was shut down, other markets took its place More secure cryptocurrencies (Monero, zcash, etc) also enabled more markets

Tor “The Onion Router” Messages are encapsulated in multiple layers of encryption much like an onion Each layer is decrypted (peeled) at an intermediate note along the way to its destination The transmitter determines the route before sending any data

Tor Routing (Onion Routing)

Onion Routing Explained Client must know full route before sending message Adds multiple layers of encryption At each intermediate node a layer is decrypted and passed to the next node At the final node, the message is fully decrypted

Pros and Cons of Tor Pros Anonymity Free Secure Communications Cons Slow Connection terminated after 10 minutes Vulnerable to traffic analysis

I2P: Invisible Internet Project What is I2P -Decentralized anonymizing network designed as a self-contained darknet -Allows applications to send messages to each other pseudonymously and securely -Used largely for web surfing, chatting, blogging, and file transfers. History of I2P -proposed as a modification to Freenet in February 2003 - grows into platform anonCommFramework in April 2003 -Code writing started in August 2003 and I2P Android was released on Google Play August 2014

I2P: Mechanics and Garlic Routing -Uses peer to peer encrypted tunnels (all users on the servers are also routers) -Uses Garlic routing, encrypting multiple messages together and making traffic analysis attacks more difficult. -Encrypted tunnels are unidirectional. Incoming and outgoing traffic are separate, improving anonymity. -Packet switching is used for load balancing across multiple peers instead of just one route. -Sender and receiver do not communicate directly with each other. Messages are passed through multiple routers, achieving anonymity.

I2P Garlic Routing

TOR VS I2P -I2P uses garlic routing instead of onion routing which implements ,not only multiple layers, but multiple messages as well making attacks more difficult and improving latency. -TOR does not have unidirectional tunnels -TOR uses circuit switching while I2P uses packet switching -I2P uses its own API so its applications were made specifically for I2p making it more secure and faster and TOR uses SOCKS -I2P is able to use torrents which are more secure and anonymous while TOR cannot. -TOR is more popular and therefore has better funding, a bigger user base, and academic and hacker community support. -Tunnels in I2P are short lived giving attackers a smaller number of samples to be able to prepare an attack, while TOR’s circuits are usually long lived.

I2P: Cons -It is still considered beta software even though it has been 15 years since its creation -It has a limited amount of users which decreases anonymity. Each user is a node and less nodes equal less anonymity. -It is slower than normal Internet. The encryption and routing limits the bandwidth. However, when more users are online, the speed increases.

Sources https://curiosity.com/topics/the-deep-web-is-the-99-of-the-internet-you-dont-see-curiosity/ https://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm The Invisible Internet Project. https://geti2p.net/ https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf

Sources (cont) https://www.torproject.org/about/overview.html.en https://www.youtube.com/watch?v=QRYzre4bf7I http://www.worldwidewebsize.com/