deep internet
Abstract
This document describes the excessive rise of the WWW in which the structure of the web is detailed through the different levels or layers that the internet has until reaching the deep internet since each of them has its own characteristics to differentiate them, it has been focused on the differences between the darkweb and surface web with respect to the deepweb both in structure, operation, breadth of information and accessibility, in addition to search strategies that have several resources that at the same time work with the use of special search engines for their access, as is the case of Tor for access to the deepweb, among other search engines with similar characteristics in their operation but each one provides results although they have great benefits in terms of access to non-indexed information and the anonymity of browsing as a great advantage for society but it also gives rise to bad intentions that later become illegal actions of people in certain spaces where everything can be found, such as illegal markets.
Downloads
References
(1) A. Strauss, J. Corbin, and E. Zimmerman, Bases de la investigación cualitativa. 2012.
(2) S. Gomez Bastar, Metodologia de la investigacion. 2012.
(3) C. A. T. Bernal, Metodología de la investigación. 2010.
(4) M. Dalmaroni, “Metodología de la investigación literaria,” p. 13, 2006.
(5) R. Knott, “What does the WWW offer mathematics students and teachers,” Teach. Math. its Appl., vol. 18, no. 1, pp. 2–9, Mar. 1999.
(6) R. Albert, H. Jeong, and A. L. Barabási, “Diameter of the world-wide web,” Nature, vol. 401, no. 6749, pp. 130–131, 1999.
(7) R. Cooley, B. Mobasher, and J. Srivastava, “Web mining: Information and pattern discovery on the world wide web,” Tools with Artif. Intell. 1997. Proceedings., Ninth IEEE Int. Conf., pp. 558–567, 1997.
(8) D. de Kerckhove, INTELIGENCIA CONECTIVA - La emergencia de la Cibersociedad. 1998.
(9) D. Conforto and L. M. C. Santarosa, “Acessibilidade À Web : Internet Para Todos,” Rev. Informática na Educ. Teor. Prática, 2002.
(10) Z. Gong, Web information systems and mining : international conference, WISM 2011, Taiyuan, China, September 24-25, 2011, proceedings. Part II. Taiyuan, China: Springer, 2011.
(11) I. Mourin, Descendiendo hasta el infierno: Un paseo por lo más oscuro de internet. Grupo Planeta, 2017.
(12) 徐和祥, “DeepWeb 集成中若干技术研究,” 2008.
(13) P. Allegritti, Deep Web: La parte oscura y peligrosa de internet. Penguin Random House Grupo Editorial Argentina, 2018.
(14) J. P. F. Marcon and T. P. Dias, “DEEPWEB: O Lado Sombrio da Internet,” Conjunt. Glob., 2014.
(15) O. L. Editora, P. O. L. Editora, and C. O. L. Editora, Deep Web: Guia Mundo em Foco Especial Ed.01. 2016.
(16) K. Finklea, “Dark Web,” CRS Rep., p. 18, 2015.
(17) J. Antonio, A. López, and G. Varela, “La Web Oculta y cómo los buscadores encuentran la información,” PAAKAT Rev. Tecnol. y Soc., p. 5, 2015.
(18) U. Bryan and E. M. Palacios, “Surface Web vs. Deep Web,” Rev. Boliv., pp. 1–3.
(19) M. K. Bergman, M. J. Cafarella, J. Madhavan, and A. Halevy, “Papers ’ Contributions,” pp. 1–23, 2011.
(20) B. He, M. Patel, Z. Zhang, and K. C.-C. Chang, “Accessing the deep web,” Commun. ACM, 2007.
(21) U. Luisa and Q. Mamani, “Deep Web: El Lado Oscuro Del Internet.”
(22) S. Chhabra, ICT influences on human development, interaction, and collaboration. Information Science Reference, 2013.
(23) R. DE Seguridad Pública et al., “Cuadernos de la guardia civil redactora jefe adjunta consejo editorial consejo de redacción,” Rev. Segur. PÚBLICA, vol. 3, no. 54, pp. 50–73, 2017.
(24) J. R. Vaquero Pulido, “Los motores de búsqueda en Internet ,” Asoc. Hisp. Doc. en Internet, 2002.
(25) N. S. Stark, “Motores De Búsqueda En Internet,” Univ. Nac. Luján, 2011.
(26) P. M. Moreno Jiménez, “Estrategias y mecanismos de búsqueda en la web invisible,” p. 21, 2005.
(27) K. Centro Nacional de Información de Ciencias Médicas. and R. Ronda León, “El web como sistema de información,” ACIMED, vol. 14, no. 1, pp. 0–0, 2006.
(28) T. Berners-Lee, J. Hendler, and O. Lassila, “The semantic web,” Scientific American. 2001.
(29) Y. Ma and X. Xu, “Locating tor’s hidden service clients based on protocol feature,” in 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2017, pp. 282–285.
(30) Ruano Muñoz Marco Antonio, “La red Tor como elemento de privacidad en nuestras vidas,” Segur. Cult. prevención para TI, vol. 30, p. 39, 2017.
(31) F. Mercaldo and F. Martinelli, “Tor traffic analysis and identification,” in 2017 AEIT International Annual Conference, 2017, pp. 1–6.
(32) A. Ali et al., “TOR vs I2P: A comparative study,” in Proceedings of the IEEE International Conference on Industrial Technology, 2016, vol. 2016–May, pp. 1748–1751.
(33) A. Pescape, A. Montieri, G. Aceto, and D. Ciuonzo, “Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web),” IEEE Trans. Dependable Secur. Comput., pp. 1–1, 2018.
(34) I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” pp. 46–66, 2001.
(35) K. Bennett, C. Grothoff, T. Horozov, I. Patrascu, and T. Stef, “GNUnet - A truly anonymous networking infrastructure,” 2002.
Copyright (c) 2018 Ciencias de la Ingeniería y Aplicadas
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The authors who publish in this journal agree to the following terms:
- Creative Commons Attribution-NonCommercial-NoDerivatives License allows others to share the work with acknowledgment of authorship of the work and initial publication in this journal.
- Authors may separately establish additional agreements for the non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to disseminate their work electronically (for example, in institutional repositories or on their own website) before and during the submission process, as it can lead to productive exchanges, as well as further citation. earliest and largest of published works (See The Effect of Open Access) (in English).