Thursday, October 8, 2015

Secrets of deep and dark networks what you do not know the Internet

Both sides of things, networks, too, deep and dark networks (parts that cannot be crawled by search engines in the Internet network) has been around for years, but in the IoE (all things Internet of Everything Internet) age, it may play a more important role.

We often hear people refer to a hidden network, known as the dark network. Lei Feng network dark before networks had a depth of analysis.

If not for some events (such as the recent Silk Road 2.0 event), probably most people'll never heard the term dark network. But now the situation is slowly changing, once the IoE's evolution is achieved, coupled with various types of penetration, dark network convergence is unstoppable, and this will pose a huge challenge to network security.

Those familiar with the dark network and its laws will get more chances to develop surface network. Because along with the IoE, will be interoperability between billions of devices, even between devices will be some independent exchanges. What we call the network, but is built on information sharing platform on the Internet, future with IoE we obtain information grows geometrically, this is nothing more than a mathematical problem. So the action of the security sector, give some thought to how to resist the attack of dark dark networks.

Now, let us run through the network contained in the element. We will deeply explore each and every element, test their index and sort out their relationship with the IoE.

Do you think networking only one layer? In actual fact, it altogether three floors.

If you want to peel off layer after layer of the core of the network, you will find it a total of three layers:

Surface network: this layer of the network that you are familiar with and use of the network, any search engine can crawl and easy access.

The deep Web: all networks outside of the surface Web, we are called the deep Web, search engines cannot crawl it. It is not completely hidden, just ordinary search engines cannot find its whereabouts. However the use of certain tools (easily accessible) visit nor is it so difficult.

Dark screen: dark Web is part of the deep Web, but have been deliberately hidden. If Daniel is not technology, it's hard to have access to this network. It is also part of the network's most notorious, many bad things in here you can't imagine. FOSSIL iPhone 5 Case

Figure parts are below sea level in the deep Web

Surface network

Visible network of surface net is familiar, but in fact it only 4% to 20% of the entire network, we usually visit this type of network. Crawl through links we can easily access these pages.

Search engines such as Google, Bing, Baidu is the main us access to these sites, in addition to this we do not need any other additional tools or special algorithm. All in all, your search results obtained through search engines are already stored in their database of hyperlinks in the index.

The deep Web

Deep Web and surface is a symbiosis of the brothers, but their personalities are quite the contrary, but it is also an interesting Internet platform as a whole. This part of the network have a lot of pages, but you need to take a few more steps to find their trail. Dark Web is a branch of the deep Web, usually these two terms are used interchangeably, but they also have differences, in the following article we will explore, in addition, it is also one of the IoE continues to develop derivatives.

So what is it? As a simple example, United States Internal Revenue Service Web site on deep Web content, if you perform common operations, search terms related to tax, then it displays the results are normal. But if you want to see something in particular, you need to use keyword search. This is known as the deep Web content is a common search engines could not be retrieved.

The deep Web, is no secret to the parts that can be accessed. We normally use it just under the surface of a thin layer.

Dark NET FOSSIL iPhone 5

Finished the deep Web, let us say the dark network. It is the more sinister part of the deep Web, but the surprise is, its number of domain names and even surface of 400 to 500 times.

Dark Web content is being hidden, and it became the most mysterious parts of the Internet. This layer of the network and some are legitimate, but some of them have been secretly by the Government to engage in espionage, many also have a dirty little secret.

Generally dark network with a specific encoding keyword technologies through this technology you can touch the edges. In addition, you can't sub domain link to this website, any search algorithms have nothing on them. For example, "/image/camaro_black.gif", which is the dark part of the network, the blog has been updated, but the public can't see it, or it has published some blog, but you cannot reference it. It has always been around, but if you don't know it's special URL, you will never find it.

The other is by changing the title to change the page. According to the different access methods, under the same title will be hidden entirely different pages, so that the page is invisible to a certain extent.

In addition, virtual network is a form of dark network, because it also needs special software to access. But most of this is legal, it meets the demand for remote access to the corporate network. However, some people use the Onion Router (Tor) or Invisible Internet Project (I2P) tool to explore the dark core of the network through the virtual network.

Without the dark, darker only

Some people said we should have complete anonymity when accessing the Internet, and Tor, I2P, and other similar tools is born. In an ideal world, it may be easier to implement, but in the real world, the use of these tools may make your behaviour became illegal and unethical; a typical example is the drug and illegal arms trade, trafficking in human beings and child pornography.

Some people also use their illegal activities, such as disclosure of sensitive information, money laundering, identity theft and credit card fraud. It is also one of our concerns about the IoE.

Ordinary people will do all these secret activities, the Government could also do. Using this network of outside the law, law enforcement agencies or Government departments can without leaving any traces of suspicious Web site or review service. Unfortunately, some people have embarked on the path, or the Government to use this convenient do illegal things.

In China, these dark network to fight censorship. In Western countries, but a real concern or those who use those networks of organized crime, regulation in this field is blank.

Last year, a search engine called Grams was born. It is a knockoff of Google, but Tor anonymous browser integration. The company claims that their search engine can help you find more simple illegal Web sites, such as trafficking in drugs, firearms and stolen credit card numbers, counterfeit money, counterfeit identity cards website. These sites a secret before, only know the complete URL to access the Web site. In other words, it can work just like regular search engines, find site "world's best".

So, to let the dark network disappears not so easy. In fact, security experts believe the dark network has begun its expansion pace. So how do we want defense? Attack from the dark network now also caught people off guard, malware, viruses, backdoors, surged to DoS attacks, hackers can not be soft. In addition, with the expansion of the IoE, hackers frequently grows geometrically. But these dark secretive network attacks, security personnel poses a great challenge.

Repel the dark network attacks

How better protected against invasion of dark NET? First of all, we need to truly understand it, this requires us to think like a dark network hackers. Dark stealth capabilities of the network of hackers is the best barrier, if we are unable to determine the source of attacks in case of attack, Defense operations as a whole are likely to be misleading, finally crushing defeat.

Here are some hackers use network crimes:

Recruiting hackers

Stealing competitor's product design and intellectual property rights and counterfeiting

By vulnerability to hack account theft

Combined with other hacker attacks on other sites

Hacker Forum to be held

Hacking up a lot, these are just the most activity is the network security team's areas of concern.

https://www.youtube.com/watch?v=YS_P-7iGtBc

Once we have mastered the dark network of laws, only three steps you can create a decent firewall, to repel the dark Internet attacks.

First, we can use equipped with Tor, and I2P or any other similar dark network tools builds a dark Web browsing environment for ourselves, but these actions need to be carried out in secret on the virtual machine. This technology is very mature and widely used in the field of network security.

Secondly, the dark areas of net attacks more frequent monitoring. According to the data of the global information management committee, we have listed the following six major areas:

Hides the list of services. TOR and I2P use distributed hash table systems to hide the base station information, we can deploy some nodes monitoring and positioning for these attacks.

Customer data monitoring. But the monitor directly to the customer, but through tracking check requests for destination of those top level domain name fraud.

Social networking site monitoring. Including monitoring of famous sites like Pastebin, to find the hidden service.

Hide the service monitor. Authorities needed the first time staring at those new sites and services, in order not to go underground.

Semantic analysis. We need to build a hide site activities and historical database that can be shared.

Market analysis. Illegal activities between sellers and buyers and brokers need to attract the attention of law enforcement agencies.

For those who dig out hard from the dark network data, we have to carefully analyze and establish a long term data repository for future reference. In fact the dark NET data like an ordinary Web site is no different, just because it's the mystery of where and how to make it special.

Finally, many areas are more or less associated with them, this article cannot enumerate, hoping that these words can inspire readers, let them face the dark network without loss.

Supplement

In fact dark NET will always be our great misfortune. As long as the IoE also, hackers can attack through the IoE dark screen on new equipment, we can only passive resistance.

But due to social neglect, dark threats from network become more and more serious. Many signs, dark NET in the next few years will be greater development, a hotbed of hacker activity or other criminal activity.

Resist the attack of dark NET is not so difficult, we just need a new tools and new ideas.

viasemiengineering

65 votes

360mini security router

Routing, a product of traditional concepts and ever-changing product, if members have paid attention to it. Almost all large companies are more or less out of the routing, especially today. The reason is actually very simple, traditional routing content for a wired connection, wireless connection device is very limited. Intelligent rapid coming of age today, in addition to the traditional computer networking, a more intelligent devices need to provide service to access networks wirelessly

View details of the voting >>

FOSSIL iPhone 5

No comments:

Post a Comment