Darknet in the Cyberspace Security System
https://doi.org/10.25205/2542-0410-2024-20-4-50-59
Abstract
The author states the active use of the Shadow Internet by the criminal environment with a clear lag in forensic research of this level of the Internet. It should be borne in mind that although the Shadow Internet contains, according to various data, from 0.1 to 1% of the information of the entire Internet, but its active use for criminal purposes requires scientific study. The author examines the basics of the functioning of the Darknet network and states that the increased level of anonymization of this network is due to peer-to-peer interaction, onion and tunnel routing, mixing cascades, multi-stage data transfer and other methods. The article indicates that the main criminalistic methods of working with Darknet are aimed at hacking, extracting and researching information from some Darknet services, de-anonymizing and identifying users. The use of neural networks designed for Big Data analysis (Big Date) can be of great benefit in terms of de-an onymization of suspects on the Darknet network. The author off ers recommendations related to the use of peer—to-peer networks based on tunnel routing technologies 2IP (Invisible Internet Project – invisible Internet) and The Onion Router when working on the Darknet network. Summing up, the author states that the fight against illegal content and the use of the Shadow Internet for criminal purposes should be conducted comprehensively and systematically.
Keywords
About the Author
A. B. SmushkinRussian Federation
Alexander B. Smushkin, Candidate of Law, Leading Researcher С/S of the Project Office of Scientific Programs and Research, Associate Professor of the Department of Criminology
Researcher ID: AAM-2853-2020
Scopus ID: 57202012484
Saratov
References
1. Iksanov R. A., Slepov G. S. Protection of citizens’ rights from encroachments on the Darknet network. Mezhdunarodnyi zhurnal gumanitarnykh i estestvennykh nauk, 2018, no. 4. pp. 271–273 (in Russ).
2. Uzdenov R. M. New frontiers of cybercrime. Vserossiiskii kriminologicheskii zhurnal, 2016, vol. 10. no. 4. pp. 649–655. (in Russ).
3. Vekhov V. B. (eds.) Digital criminalistics: textbook for universitie. 2-ed. Moscow, Yurait publ., 2024, 490 p. (in Russ).
4. Bondarenko Yu. A., Kizilov G. M. (2019) Problems of identifying and using traces of crimes left on the Darknet network. Gumanitarnye, sotsial’no-ekonomicheskie i obshchestvennye nauki, 2019, no. 5. pp. 97–101. (in Russ)
5. Arjan Blokland, Anton Daser, Meike de Boer, Colm Gannon, Frederic Gnielka, Salla Huikuri, Rebecca Reichel, Thomas Shäfer, Alexander F. Schmidt, Katarzyna Staciwa, Robert Lehmann. Why do users continue to contribute to darknet Child Sexual Abuse Material forums? Examining social exchange, social capital, and social learning explanations using digital forensic artifacts. Child Abuse & Neglect, 2024, vol. 153, 106815.
6. Divya Baronia. Dark Web And Tor Forensic. Informaticss.com available at: https://informaticss.com/dark-web-and-tor-forensic/ (accessed: 25.04.2024).
7. Novosel’tseva A. V., Klyuev S. G. Modern methods of deanonymization attacks on the TOR network. Prikaspiiskii zhurnal: upravlenie i vysokie tekhnologii, 2020, no. 1 (49), pp. 155–161.
8. Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis Chakravarty, S., Barbera, M. V., Portokalidis, G., Polychronakis, M., Keromytis, A. D. On the Eff ectiveness of Traffi c Analysis against Anonymity Networks Using Flow Records. In: Faloutsos M., Kuzmanovic A. (eds) Passive and Active Measurement. PAM 2014. Lecture Notes in Computer Science, 2014, vol. 8362. Springer, Cham. pp. 247–257.
9. Muir, Matt & Leimich, Petra & Buchanan, William. A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 2019, vol. 29. 10.1016/j.diin.2019.03.009. pp. 118–128;
10. Katsiaryna Bahamazava and Rohan Nanda. The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence. Forensic Science International: Digital Investigation, 2022, vol. 40, 301377.
11. Smushkin A. B. The concept of remote criminalistics Moscow, Yurlitinform, 256 p. (in Russ.).
12. Belousov A. A., Vasil’ev A. M. Features in the qualifi cation of crimes in the fi eld of depersonalization of cryptocurrencies by guilty persons. Tendentsii razvitiya nauki i obrazovaniya, 2023, no. 96-5, pp. 31–39 (in Russ.).
13. Dolejška, Michal Koutenský, Vladimír Veselý, Jan Pluskal. Busting up Monopoly: Methods for modern darknet marketplace forensics. Forensic Science International: Digital Investigation, 2023, vol. 46, suppl., 301604.
14. Bryleva E. A., Veliev F. M. (2018) Human rights and the Internet space: new realities. Yuridicheskaya nauka: istoriya i sovremennost’, 2018, no. 11, pp. 75–80 (in Russ.).
Review
For citations:
Smushkin A.B. Darknet in the Cyberspace Security System. Juridical science and practice. 2024;20(4):50-59. (In Russ.) https://doi.org/10.25205/2542-0410-2024-20-4-50-59