[PDF][PDF] Darknet Security: A Categorization of Attacks to the Tor Network.

E Cambiaso, I Vaccari, L Patti, M Aiello - ITASEC, 2019 - ceur-ws.org
In the darknet security topic, it is important to analyze the threats that characterize the
network. This paper deeply investigates the literature of attacks against the Tor network …

Interconnection between darknets

C Cilleruelo, L De-Marcos… - IEEE Internet …, 2020 - ieeexplore.ieee.org
Tor and i2p networks are two of the most popular darknets. Both darknets have become an
area of illegal activities highlighting the necessity to study and analyze them to identify and …

[PDF][PDF] The tor dark net

G Owen, N Savage - 2015 - cigionline.org
Gareth Owen is a senior lecturer in the School of Computing at the University of Portsmouth.
He holds a Ph. D. in computer science and has expertise in distributed computing systems …

A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic

S Choi, J Song, S Kim, S Kim - Security and Communication …, 2014 - Wiley Online Library
In general, attackers carry out scanning or probing against a certain network when they start
to attack their victims. Because of this, darknet is very useful to observe the scanning …

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

C Fachkha, E Bou-Harb, A Boukhtouta… - … Conference on Risks …, 2012 - ieeexplore.ieee.org
An effective approach to gather cyber threat intelligence is to collect and analyze traffic
destined to unused Internet addresses known as darknets. In this paper, we elaborate on …

D-miner: A framework for mining, searching, visualizing, and alerting on darknet events

H Lawrence, A Hughes, R Tonic… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
Darknet resources are mined for their data in order to provide possible cyber threat
intelligence to network operators. Network operators, however, often have limited resources …

[HTML][HTML] Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet

J Song, Y Lee, JW Choi, JM Gil, J Han, SS Choi - Sustainability, 2017 - mdpi.com
The darknet (ie, a set of unused IP addresses) is a very useful solution for observing the
global trends of cyber threats and analyzing attack activities on the Internet. Since the …

Dark-net ecosystem cyber-threat intelligence (CTI) tool

N Arnold, M Ebrahimi, N Zhang… - … on Intelligence and …, 2019 - ieeexplore.ieee.org
The frequency and costs of cyber-attacks are increasing each year. By the end of 2019, the
total cost of data breaches is expected to reach $2.1 trillion through the ever-growing online …

Behavior analysis of long-term cyber attacks in the darknet

T Ban, L Zhu, J Shimamura, S Pang, D Inoue… - … , ICONIP 2012, Doha …, 2012 - Springer
Darknet monitoring provides us an effective way to countermeasure cyber attacks that pose
a significant threat to network security and management. This paper aims to characterize the …

Are darknets all the same? On darknet visibility for security monitoring

F Soro, I Drago, M Trevisan, M Mellia… - … symposium on local …, 2019 - ieeexplore.ieee.org
Darknets are sets of IP addresses that are advertised but do not host any client or server. By
passively recording the incoming packets, they assist network monitoring activities. Since …