VSC Putrevu, G Ratnakaram, S Shukla - Proceedings of the 2022 …, 2022 - dl.acm.org
Darknet traffic is defined as the network traffic arriving at a network with destination IP addresses that are allocated to the network but are not assigned to any device. Darknet …
T Kasama - Journal of the National Institute of Information and …, 2017 - jstage.jst.go.jp
The first step in cyberattack countermeasures is to quickly and correctly understand actual attack activities. We have been performing research and development at the Network …
J Liu, K Fukuda - 2014 International Wireless Communications …, 2014 - ieeexplore.ieee.org
Darknets can be used to monitor unexpected network traffic destined for allocated but unused IP address blocks, thus providing an effective traffic measurement technique for …
A common form of 'darknet'used by security researchers and analysts is a block of unused address space on a network. As the address-space is unused, and ideally has never been …
J Liu, K Fukuda - Journal of Information Processing, 2018 - jstage.jst.go.jp
To enhance Internet security, researchers have largely emphasized diverse cyberspace monitoring approaches to observe cyber attacks and anomalies. Among them darknet …
F Gadhia, J Choi, B Cho, J Song - 2015 17th International …, 2015 - ieeexplore.ieee.org
Today, Internet is incessantly attacked by wide variety of network-based threats. One of the ways to monitor or identify such prevailing threats is to monitor incoming traffic to unused …
D Yadav, N Vanjani, SK Shukla - Indian Institute of Technology Kanpur, 2017 - iitk.ac.in
In an era where every device and service is going online, cyber attacks are on a rise. Attackers actively look for vulnerable devices and services running on the Internet. In this …
PS Joshi, HA Dinesha - 2020 Third International Conference on …, 2020 - ieeexplore.ieee.org
The evolutionary types of attacks generated by attacker makes it difficult to identify them. Novel tools and techniques are required to detect, analyze, and generate reports for threat …
J Song, Y Lee, JW Choi, JM Gil, J Han, SS Choi - Sustainability, 2017 - mdpi.com
The darknet (ie, a set of unused IP addresses) is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the …