deep internet

  • Félix Mauricio Murillo Calderón Universidad Técnica de Cotopaxi
  • Diana Raquel Diaz Tapia Universidad Técnica de Cotopaxi
Keywords: Deepweb, Darkweb, Surfaceweb, Tor, Search engines

Abstract

This document describes the excessive rise of the WWW in which the structure of the web is detailed through the different levels or layers that the internet has until reaching the deep internet since each of them has its own characteristics to differentiate them, it has been focused on the differences between the darkweb and surface web with respect to the deepweb both in structure, operation, breadth of information and accessibility, in addition to search strategies that have several resources that at the same time work with the use of special search engines for their access, as is the case of Tor for access to the deepweb, among other search engines with similar characteristics in their operation but each one provides results although they have great benefits in terms of access to non-indexed information and the anonymity of browsing as a great advantage for society but it also gives rise to bad intentions that later become illegal actions of people in certain spaces where everything can be found, such as illegal markets.

Downloads

Download data is not yet available.

References

(1) A. Strauss, J. Corbin, and E. Zimmerman, Bases de la investigación cualitativa. 2012.

(2) S. Gomez Bastar, Metodologia de la investigacion. 2012.

(3) C. A. T. Bernal, Metodología de la investigación. 2010.

(4) M. Dalmaroni, “Metodología de la investigación literaria,” p. 13, 2006.

(5) R. Knott, “What does the WWW offer mathematics students and teachers,” Teach. Math. its Appl., vol. 18, no. 1, pp. 2–9, Mar. 1999.

(6) R. Albert, H. Jeong, and A. L. Barabási, “Diameter of the world-wide web,” Nature, vol. 401, no. 6749, pp. 130–131, 1999.

(7) R. Cooley, B. Mobasher, and J. Srivastava, “Web mining: Information and pattern discovery on the world wide web,” Tools with Artif. Intell. 1997. Proceedings., Ninth IEEE Int. Conf., pp. 558–567, 1997.

(8) D. de Kerckhove, INTELIGENCIA CONECTIVA - La emergencia de la Cibersociedad. 1998.

(9) D. Conforto and L. M. C. Santarosa, “Acessibilidade À Web : Internet Para Todos,” Rev. Informática na Educ. Teor. Prática, 2002.

(10) Z. Gong, Web information systems and mining : international conference, WISM 2011, Taiyuan, China, September 24-25, 2011, proceedings. Part II. Taiyuan, China: Springer, 2011.

(11) I. Mourin, Descendiendo hasta el infierno: Un paseo por lo más oscuro de internet. Grupo Planeta, 2017.

(12) 徐和祥, “DeepWeb 集成中若干技术研究,” 2008.

(13) P. Allegritti, Deep Web: La parte oscura y peligrosa de internet. Penguin Random House Grupo Editorial Argentina, 2018.

(14) J. P. F. Marcon and T. P. Dias, “DEEPWEB: O Lado Sombrio da Internet,” Conjunt. Glob., 2014.

(15) O. L. Editora, P. O. L. Editora, and C. O. L. Editora, Deep Web: Guia Mundo em Foco Especial Ed.01. 2016.

(16) K. Finklea, “Dark Web,” CRS Rep., p. 18, 2015.

(17) J. Antonio, A. López, and G. Varela, “La Web Oculta y cómo los buscadores encuentran la información,” PAAKAT Rev. Tecnol. y Soc., p. 5, 2015.

(18) U. Bryan and E. M. Palacios, “Surface Web vs. Deep Web,” Rev. Boliv., pp. 1–3.

(19) M. K. Bergman, M. J. Cafarella, J. Madhavan, and A. Halevy, “Papers ’ Contributions,” pp. 1–23, 2011.

(20) B. He, M. Patel, Z. Zhang, and K. C.-C. Chang, “Accessing the deep web,” Commun. ACM, 2007.

(21) U. Luisa and Q. Mamani, “Deep Web: El Lado Oscuro Del Internet.”

(22) S. Chhabra, ICT influences on human development, interaction, and collaboration. Information Science Reference, 2013.

(23) R. DE Seguridad Pública et al., “Cuadernos de la guardia civil redactora jefe adjunta consejo editorial consejo de redacción,” Rev. Segur. PÚBLICA, vol. 3, no. 54, pp. 50–73, 2017.

(24) J. R. Vaquero Pulido, “Los motores de búsqueda en Internet ,” Asoc. Hisp. Doc. en Internet, 2002.

(25) N. S. Stark, “Motores De Búsqueda En Internet,” Univ. Nac. Luján, 2011.

(26) P. M. Moreno Jiménez, “Estrategias y mecanismos de búsqueda en la web invisible,” p. 21, 2005.

(27) K. Centro Nacional de Información de Ciencias Médicas. and R. Ronda León, “El web como sistema de información,” ACIMED, vol. 14, no. 1, pp. 0–0, 2006.

(28) T. Berners-Lee, J. Hendler, and O. Lassila, “The semantic web,” Scientific American. 2001.

(29) Y. Ma and X. Xu, “Locating tor’s hidden service clients based on protocol feature,” in 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2017, pp. 282–285.

(30) Ruano Muñoz Marco Antonio, “La red Tor como elemento de privacidad en nuestras vidas,” Segur. Cult. prevención para TI, vol. 30, p. 39, 2017.

(31) F. Mercaldo and F. Martinelli, “Tor traffic analysis and identification,” in 2017 AEIT International Annual Conference, 2017, pp. 1–6.

(32) A. Ali et al., “TOR vs I2P: A comparative study,” in Proceedings of the IEEE International Conference on Industrial Technology, 2016, vol. 2016–May, pp. 1748–1751.

(33) A. Pescape, A. Montieri, G. Aceto, and D. Ciuonzo, “Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web),” IEEE Trans. Dependable Secur. Comput., pp. 1–1, 2018.

(34) I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” pp. 46–66, 2001.

(35) K. Bennett, C. Grothoff, T. Horozov, I. Patrascu, and T. Stef, “GNUnet - A truly anonymous networking infrastructure,” 2002.

Published
2018-07-01
How to Cite
Murillo CalderónF. M., & Diaz TapiaD. R. (2018). deep internet. Ciencias De La Ingeniería Y Aplicadas, 2(1), 16-28. Retrieved from http://investigacion.utc.edu.ec/index.php/ciya/article/view/122
Section
Artículos de revisión