Home / Industry

The Deep Web and the Darknet - The Nether Regions of the Internet

By now, you've likely heard about the Deep Web and the Darknet — but what are they, and should brand owners be concerned about monitoring and enforcing on the nether regions of the Internet?

You betcha.

The Deep Web, unlike the Surface Web, is comprised of un-indexed webpages, dynamic content pages, and otherwise gated information inaccessible via a regular browsers or search engines. The Surface Web is what we would consider "regular" webpages that can be indexed by search engines. What many people don't realize is that most of the Internet is actually in the Deep Web, and mainstream browsers will only give you access to 4% of the Internet!

A wide range of information can be found in the Deep Web, including academic resources, subscription information and conference proceedings. Unfortunately, the Deep Web is also where un-indexed sites sell counterfeit or grey market goods, collect user credentials, disseminate malware, engage in false association, and conduct consumer scams. Internet users are directed to the Deep Web through a variety of methods including spam (of all types), advertisements, and cybersquatted domain names.

So then, what exactly is the Darknet?

Technically a small subset of the Deep Web, the Darknet is a network that can only be accessed via the Tor (The Onion Router) browser. Tor was originally developed in the mid-90's by the United States Naval Research Laboratory to protect intelligence communication — and today, approximately 2.5 million access it on a daily basis. The main purpose for using Tor is to enable anonymous communication and it is used by political dissidents in hostile regimes. It is also appealing to strong privacy advocates who don't want their online actions to be tracked by advertisers and officials, journalists when searching for dangerous and sensitive information, as well as criminals who want to profit while maintaining their anonymity.

Given how easy it is to download Tor, it's no surprise that people are accessing the Darknet to visit underground marketplaces where counterfeit, pirated, and illicit goods are sold.

As a brand owner, it is important for you to know how your brand is being represented in both the Deep Web and the Darknet. While monitoring and enforcing against abuse on the Surface Web is a requirement for most companies these days, policing the Deep Web is actually just as important, if not more so, as offenders are actively seeking to evade detection. The good news is that for abuse occurring in much of the Deep Web (not including the Darknet), standard enforcement strategies can be utilized. However, due to the anonymity of the Darknet, it's imperative to reset expectations regarding enforcement, as the emphasis will be on monitoring and understanding the scope of the problem.

Protect the brand equity and customer loyalty you've built. Learn more about MarkMonitor Brand Protection services.


About MarkMonitor – MarkMonitor®, the world leader in enterprise brand protection uses a SaaS delivery model to provide advanced technology and expertise that protects the revenues and reputations of the world's leading brands. Learn More

Related topics: Cybercrime


Don't miss a thing – get the Weekly Wrap delivered to your inbox.

Related Blogs

Related News

Explore Topics

Dig Deeper

DNS Security

Sponsored by Afilias

IP Addressing

Sponsored by Avenue4 LLC


Sponsored by Verisign

Mobile Internet

Sponsored by Afilias Mobile & Web Services

Promoted Posts

Buying or Selling IPv4 Addresses?

ACCELR/8 is a transformative IPv4 market solution developed by industry veterans Marc Lindsey and Janine Goodman that enables organizations buying or selling blocks as small as /20s to keep pace with the evolving demands of the market by applying processes that have delivered value for many of the largest market participants. more»

Industry Updates – Sponsored Posts

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

i2Coalition to Host First Ever Smarter Internet Forum

Best Practices from Verizon - Proactively Mitigating Emerging Fraudulent Activities

Neustar Data Identifies Most Popular Times of Year for DDoS Attacks in 2015

The Framework for Resilient Cybersecurity (Webinar)

2015 Trends: Multi-channel, Streaming Media and the Growth of Fraud

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

Verisign's Q2'15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Announcing Verisign IntelGraph: Unprecedented Context for Cybersecurity Intelligence

Introducing the Verisign DNS Firewall

Verisign iDefense 2015 Cyber-Threats and Trends

Q3 2014 DDoS Trends: Attacks Exceeding 10 Gbps on the Rise

Tips to Address New FFIEC DDoS Requirements

Smokescreening: Data Theft Makes DDoS More Dangerous

MarkMonitor Named a Top Trusted Website in OTA's 2013 Online Trust Honor Roll

Mitigating DDoS Attacks: A Global Challenge