Concept Paper
Version 1
Preserved in Portico This version is not peer-reviewed
An Empirical Study of Deep Web based on Graph Analysis
Version 1
: Received: 4 November 2020 / Approved: 5 November 2020 / Online: 5 November 2020 (16:00:45 CET)
How to cite: Morshed, M.M. An Empirical Study of Deep Web based on Graph Analysis. Preprints 2020, 2020110219. https://doi.org/10.20944/preprints202011.0219.v1 Morshed, M.M. An Empirical Study of Deep Web based on Graph Analysis. Preprints 2020, 2020110219. https://doi.org/10.20944/preprints202011.0219.v1
Abstract
The internet can broadly be divided into three parts: surface, deep and dark among which the latter offers anonymity to its users and hosts [1]. Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web [2]. Ninety six percent of the web is considered as deep web because it is hidden. It is like an iceberg, in that, people can just see a small portion above the surface, while the largest part is hidden under the sea [3, 4, and 5]. Basic methods of graph theory and data mining, that deals with social networks analysis can be comprehensively used to understand and learn Deep Web and detect cyber threats [6]. Since the internet is rapidly evolving and it is nearly impossible to censor the deep web, there is a need to develop standard mechanism and tools to monitor it. In this proposed study, our focus will be to develop standard research mechanism to understand the Deep Web which will support the researchers, academicians and law enforcement agencies to strengthen the social stability and ensure peace locally & globally.
Keywords
dark web; cybercrime; law enforcement
Subject
Computer Science and Mathematics, Algebra and Number Theory
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment