By: Jonathan Cardwell, Mark Fredricks, Ryan Vina and Jake Leiper

Slides:



Advertisements
Similar presentations
Let's say we want to access domain - reliablescribe.com First we need to buy a computer We need to subscribe to an Internet Service Provider (ISP) The.
Advertisements

VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
DARKNET.
Dark net . . Invisible Web . . Hidden Web . .
Privacy – what do they know about you? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
1 Anonshare 2.0 P2P Anonymous Browsing History Share Frank Chiang Terry Go Rui Ma Anita Mathew.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
IP BROS Presentation by: Amen Ahmed. Mario and Luigi are here to help us find our way through the internet. Mario will act as our browser and Luigi will.
Mrs. Geist Belfield Elementary School Librarian Helping Students Search Effectively.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
TCP/IP (Transmission Control Protocol / Internet Protocol)
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
science/internet-intro
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
VCE IT Theory Slideshows
4.01 How Web Pages Work.
Networks – Network Fundamentals
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Go to youtube and search “Code.org internet videos”
Original slides prepared by Theo Benson
Anonymous Internet Protocols
Onions and Garlic: the protocols of I2P
Application layer tcp/ip
Tor Good + Evil.
CS590B/690B Detecting Network Interference (Fall 2016)
The Onion Router Hao-Lun Hsu
The Hidden face of the Darknet
IPv6 – THE WAY TO THE SECURE INTERNET
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Anonymous Communication
Layered Architectures
Web Mining Ref:
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Professional Web Designing For Absolute Beginners
THE STEPS TO MANAGE THE GRID
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Introducing To Networking
The University of Adelaide, School of Computer Science
Exercise ?: TOR.
Distributed Content in the Network: A Backbone View
Dark Web, I2P, and Deep Web Team 5
Privacy Through Anonymous Connection and Browsing
An Introduction to Privacy and Anonymous Communication
0x1A Great Papers in Computer Security
Foundations of Networking
Anonymous Communication
Foundations of Networking
The dark web By Riley. Sampare.
Anonymity (Privacy) Suppose you are surfing the Web.
Internet Basics Videos
Protocol Application TCP/IP Layer Model
4.01 How Web Pages Work.
How does the deep web work?
Outline The spoofing problem Approaches to handle spoofing
Anonymous Communication
Crime Behind The Keyboard(Dark Web)
Presentation transcript:

By: Jonathan Cardwell, Mark Fredricks, Ryan Vina and Jake Leiper Dark Web /I2P/ Deep Web By: Jonathan Cardwell, Mark Fredricks, Ryan Vina and Jake Leiper

Basic History ARPANET - Established in 1969 The birth of The Internet as we know it today TOR and I2P What happens when people become extremely concerned with privacy? (Mark Fredricks)

The Different Levels of the Internet (Mark Fredricks)

What is the Deep Web? The Deep Web is: The pages that won’t be found in a search system. Existed since the usage of Search Engines.

How does the Deep Web Effect the World? Do I need to fear the Deep Web? No, of course not! Except, when others can get to your info! Can I use the Deep Web without a special tool? Yes, you can! It’s as mundane as the Surface Web! UH?

How does the Deep Web Work? How do I get to a Deep Web Site? Know the URL. Access permission to use the site. Then why do people interchange the usage of the Deep Web and Dark Web terms? All about the Secrecy it gives !

What is the Dark Web? You can find anything like card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials and many more. You can also find things like chess club or BlackBook, a social network similar to facebook for the Dark Web. The Dark Web is a portion of the internet that cannot be accessed from your typical search engine. It is full of criminal activity, though this is not the only thing on the Dark Web.

How do you Access the Dark Web It is not the easiest thing to access the Dark Web. You have to use a special browser like Tor, one of the most popular. The big deal behind the Dark Web is the anonymity behind it, where it is basically impossible to track anyone through it. The browser routes your web request through thousands of proxy servers around the world, making your IP untraceable. 01001010101010010101010001010101010101001011010101101010100110010100101010010101010101010101001010101010100010010101001010010010100101001010100101010010101001100101010100101010100101011110010100110010101

Is the Dark Web Something to Fear? It can be, there is a lot of illicit information is on the Dark Web . It is estimated that over 50% of the Dark Web is criminal information.

I2P - What is it? I2P is an anonymous network (similar to TOR), that allows applications to anonymously and securely send messages to each other Strictly message based, like IP, but allows for streaming communication like TCP as well End to end encrypted so neither sender or recipient of message need to reveal their IP address While TOR focuses more on anonymous access to the “normal internet”, I2P focuses on secure viewing on the Deep Web

I2P - How does it Work? Outbound tunnels - encrypt message and hop their way to inbound tunnel Inbound tunnel - decrypt message and hop their way to the desired destination Each hop further encrypts/decrypts the message

I2P - How does it Work? Network Database - stores the router info and leaseset for a specific destination Peers are picked randomly from a list of potential peers with a good connection(low latency and high capacity)

I2P - Statistics

Work Cited Rice, Mae. “The Deep Web Is the 99% of the Internet You Can't Google.” Curiosity.com, 22 May 2018, curiosity.com/topics/the-deep-web-is-the-99-of-the-internet-you-cant-google-curiosity/. Pagliery, Jose. “The Deep Web You Don't Know About.” CNNMoney, Cable News Network, 10 Mar. 2014, money.cnn.com/2014/03/10/technology/deep-web/index.html. “The Invisible Internet Project.” I2P Anonymous Network, geti2p.net/en/. “From Tor to Ulbricht: The Deep Web Timeline.” Security Technology Evolves With Endpoints - Security News - Trend Micro USA, https://medium.com/@smartrac/the-deep-web-the-dark-web-and-simple-things-2e601ec980ac htp-web/#what-is-the-the-deep-web-thentps://darkwebnews.com/dee Kosiński, Jerzy. (2015). DEEPWEB AND DARKNET – POLICE VIEW. https://www.researchgate.net/publication/282333966 http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers

Work Cited Continued https://ksr-ugc.imgix.net/assets/011/602/607/91d6d0cc4ed117a62f37c70d97e1a077_original.jpg?crop=faces&w=1552&h=873&fit=crop&v=1463685198&auto=format&q=92&s=4d9dfc085d344e0fc9b9d4a3c6dab512 https://www.saddleback.edu/uploads/ts/images/outlook_student.png https://images.vexels.com/media/users/3/143984/isolated/preview/351d11b49a8da2ddeef502fc2f8c0d78-worried-face-emoji-by-vexels.png www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/from-tor-to-ulbricht-the-deep-web-timeline. https://geti2p.net/en/