2. Surface Web
• Search Engines such
as Google cover less
than 1% of the
Internet
• Criminals moving
from Surface to the
DeepWeb and
DarkNet
3. Deep Web
• Any webpage that is not indexed
by a search engine.
4. Dark Net
• TCPI Protocols to access
network
• Maintain level of
anonymity
• TOR (The Onion
Router)
• TOR Services (Websites
hosted on TOR)
• Freenet
5. Who Uses the
DarkNet?
• Hackers
• Criminals
• Suppliers and Customers
• Privacy advocates
• Governments
• Cybersecurity
professionals
6. Cybercriminals Moving from Surface to Deep
Web
• Surface web highly monitored
• Hard to be private and anonymous
• Gathering of data
• Government surveillance (PRISM)
7. What can be bought (using Bitcoin) on the DarkNet?
• Zero Days/Malware
• Illegal Guns/Ammo
• Child Pornography
• Human Hunting Expeditions
• Drugs
• Hitmen
• Sex Slaves
• Red Rooms (Pay for Pain)
8. How to Stop Cybercriminals on the DarkWeb
• Machine Learning – “A method of data analysis that automates
analytical model building.” (http://www.sas.com/en_us/insights/analytics/machine-learning.html)
• Tool used to scrape and find Zero Days and Malware
• Reads and crawls HTML pages
• Track down 300 cyber threats a week with ML
• “With the use of machine learning models, we are able to recall 92%
of products in marketplaces and 80% of discussions on forums
relating to malicious hacking with high precision,” says Nunes and co.
(https://www.artificialintelligenceonline.com/14822/machine-learning-algorithm-combs-the-darknet-for-zero-day-exploits-and-finds-them/)
10. Question & Discussion
1) How should cybersecurity professionals and governments’ handle
the Darknet?
2) Does the Deep Web and Darknet serve a legitimate purpose
(privacy, underground markets, etc)?
3) Is vigilante hacking ever justified for taking down some of the sites
on the Darknet and Deep Web?
4) What will be the next evolution for hackers and cybercriminals?