Detecting the dark Web on your network

The Dark Web, or Deep Web, can be used by people to shop for prohibited items such as illicit drugs or firearms, by hacking/DDoS services and even higher a hitman.
 
 
NetMuster against the baddies!
NetMuster against the baddies!
PARRAMATTA, Australia - Nov. 11, 2015 - PRLog -- Who cares as long as it is not on your network, right?

The trouble with the Dark Web it is that all data is encrypted from endpoint to endpoint so it becomes very difficult to detect if it is being used on your network. When people refer to the Dark Web they are generally referring to The Onion Routing network, which is used by the TOR browser.

However the Tor browser uses plain old SSL to pass its encrypted information to the first node on the network, so as far as a network administrator can tell it is plain old encrypted web traffic, nothing unusual about that.

Detecting that is needle in the haystack territory

Also, encrypted web traffic (SSL/https) is fast becoming the norm, especially since Google appears to favour websites encrypted with SSL over non-encrypted websites (at time of this writing).


However, with NetMuster and its deep packet inspection you get clues as to who on your network is running the Tor browser.

When the Tor browser starts up it appears to ‘leak’ its protocol information, and that is detectable by NetMuster’s deep packet inspection technology. So if we use NetMuster to have a look at our top applications we'll see the TOR network being used. Every time the Tor browser is initiated from a PC its leaked application data is detected by NetMuster. We can then zoom in on TOR by clicking on that segment and find out which local PC is generating traffic to the dark Web.

With NetMuster we can narrow down the IP address which we can then track to the PC/user trying to connect to the dark Web. This level of detail enables a network administrator to track down possible misuse of Internet resources on the network. NetMuster does this in a way that is otherwise not possible due to the clever way the Tor browser tunnels and encrypts its data.

If you would like to detect people using the Dark Web or other applications on your network shoot on over to the download section of NetMuster.com and grab yourself a copy.

https://netmuster.com/download

Contact
Turbosoft Networks
***@turbosoftnetworks.com
End
Source: » Follow
Email:***@turbosoftnetworks.com Email Verified
Tags:Network Monitoring, Computer Security, Cisco
Industry:Computers
Location:Parramatta - New South Wales - Australia
Subject:Features
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Turbosoft Networks PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share