The Evolution of Cybercrime on the Dark Web: Trends, Techniques, and Countermeasures

Authors

  • Gohil Manish Kumar Gunvantlal Assistant Professor, Computer Science, Smt. S.J. Varmora BBA and BCA Mahila College Wadhwan Author

DOI:

https://doi.org/10.31305/trjtm2024.v04.n02.003

Keywords:

Dark Web, Cybercrime, Anonymous Browsing, Cryptocurrencies

Abstract

The Dark Web has developed into a complex marketplace for illegal commerce, hacking services, and other types of criminality, and it has become an essential platform for cybercriminals. By comparing and contrasting the Dark Web with the Surface and Deep Web, this study delves into its structure and functions and charts the evolution of criminality on this shadowy portion of the internet. A lot has changed in the world of Dark Web criminality since important turning points like Silk Road and anonymous surfing tools like TOR first appeared. Ransomware, identity theft, and data breaches are just a few of the illegal behaviors included in the report, along with the methods and strategies used by cybercriminals, such as encryption, anonymity tools, and cryptocurrency. Also covered are data theft's historical development, the rise of Ransomware-as-a-Service (RaaS), and the new dangers presented by cybercrime's use of artificial intelligence and machine learning. Using case studies of prominent instances as evidence, the research goes on to evaluate the monetary, social, and legal effects of cybercrime driven by the Dark Web on international security.

References

Aldridge, J., & Décary-Hétu, D. (2016). Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets. International Journal of Drug Policy, 35, 7-15. https://doi.org/10.1016/j.drugpo.2016.01.010

Bergman, M. K. (2001). The deep web: Surfacing hidden value. Journal of Electronic Publishing, 7(1). https://doi.org/10.3998/3336451.0007.104

Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2), 213-238. https://doi.org/10.1257/jep.29.2.213

Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Proceedings of the 22nd international conference on World Wide Web, 213-224. https://doi.org/10.1145/2488388.2488408

FBI. (2021). International cooperation and dark web investigations. Federal Bureau of Investigation. https://www.fbi.gov/investigate/violent-crime/cyber

Gehl, R. W. (2018). Weaving the dark web: Legitimacy on Freenet, Tor, and I2P. MIT Press.

Greenberg, A. (2014). This machine kills secrets: How WikiLeakers, cypherpunks, and hacktivists aim to free the world's information. Plume.

Greenberg, A. (2017). Sandworm: A new era of cyberwar and the hunt for the Kremlin's most dangerous hackers. Doubleday.

Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Data breaches, phishing, or carding: How stolen data is being used by cybercriminals. Security Journal, 29(2), 368-382. https://doi.org/10.1057/sj.2013.29

Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Data breaches, phishing, or carding: How stolen data is being used by cybercriminals. Security Journal, 29(2), 368-382. https://doi.org/10.1057/sj.2013.29

Hutchings, A., & Holt, T. J. (2017). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614. https://doi.org/10.1093/bjc/azv130

IBM & Ponemon Institute. (2021). Cost of a Data Breach Report 2021. IBM Security. https://www.ibm.com/security/data-breach

Kharraz, A., Robertson, W. K., Balzarotti, D., & Kirda, E. (2015). Cutting the Gordian knot: A look under the hood of ransomware attacks. Proceedings of the 12th USENIX Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 3, 117-129. https://doi.org/10.1109/EuroSP.2016.35

Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7-38. https://doi.org/10.1080/00396338.2016.1142085

Symantec. (2019). Internet Security Threat Report. Symantec Corporation.

Downloads

Published

2024-06-30

Issue

Section

Articles

Deprecated: json_decode(): Passing null to parameter #1 ($json) of type string is deprecated in /home/u495429466/domains/technoreview.co.in/public_html/plugins/generic/citations/CitationsPlugin.php on line 68

How to Cite

Gohil, M. K. G. (2024). The Evolution of Cybercrime on the Dark Web: Trends, Techniques, and Countermeasures. TECHNO REVIEW Journal of Technology and Management , 4(2), 21-30. https://doi.org/10.31305/trjtm2024.v04.n02.003