Sunil Bhirud

Work place: Department of Computer Engineering, Veermata Jijabai Technological Institute, India



Research Interests: Soft Computing, Data Mining, Image Processing, Machine Learning


Sunil Bhirud obtained his B.E., M.E., and Ph.D. in 1987, 1995, and 2001, respectively, from SGGS College of Engineering & Technology, Nanded, India. He worked with Bush India Ltd. and SGGS College of Engineering & Technology, Nanded. He is a Professor in the Department of Computer Engineering & I.T. at VJTI Mumbai. His areas of interest include Signal & Image Processing, Soft Computing, Data Mining, and Machine learning.

Author Articles
Dark Web Monitoring as an Emerging Cybersecurity Strategy for Businesses

By Ashwini Dalvi Sunil Bhirud

DOI:, Pub. Date: 8 Apr. 2024

The increasing frequency and sophistication of cyberattacks targeting institutions have necessitated proactive measures to prevent losses and mitigate damages. One of these measures is to monitor the dark web. The dark web is a complex network of hidden services and encrypted communication protocols, with the primary purpose of providing anonymity to its users. However, criminals use the dark web to sell stolen data, launch zero-day attacks, and distribute malware. Therefore, identifying suspicious activity on the dark web is necessary for businesses to counter these threats. 
An analysis of dark web monitoring as an emerging trend in cyber security strategy is presented in this article. The article presents a systematic review of (a) why dark web surveillance enhances businesses' cybersecurity strategies, (b) how advanced tools and technologies are used to monitor dark web data in the commercial sector, (c) the key features of threat monitoring frameworks proposed by researchers, and (d) the limitations and challenges associated with dark web monitoring solutions. In summary, the proposed work involves analyzing various sources of information related to the topic and presenting a thorough assessment of the need and challenges of dark web surveillance to enhance the security measures of businesses.

[...] Read more.
Other Articles