[PDF][PDF] Study on Traffic Analysis in Darknet and Livenet for Network Security Management

ビチャイディスナパパット, びちゃいでぃすなぱぱっと - tohtech.repo.nii.ac.jp
Monitoring and understanding the activities of networked devices is essential for network
security management. Understanding the activities of attackers' devices on the Internet …

DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor

VSC Putrevu, G Ratnakaram, S Shukla - Proceedings of the 2022 …, 2022 - dl.acm.org
Darknet traffic is defined as the network traffic arriving at a network with destination IP
addresses that are allocated to the network but are not assigned to any device. Darknet …

3-1 Long-term Darknet Analysis in NICTER

T Kasama - Journal of the National Institute of Information and …, 2017 - jstage.jst.go.jp
The first step in cyberattack countermeasures is to quickly and correctly understand actual
attack activities. We have been performing research and development at the Network …

Towards a taxonomy of darknet traffic

J Liu, K Fukuda - 2014 International Wireless Communications …, 2014 - ieeexplore.ieee.org
Darknets can be used to monitor unexpected network traffic destined for allocated but
unused IP address blocks, thus providing an effective traffic measurement technique for …

Monitoring bad traffic with darknets

S Woodhead - Network Security, 2012 - Elsevier
A common form of 'darknet'used by security researchers and analysts is a block of unused
address space on a network. As the address-space is unused, and ideally has never been …

An evaluation of darknet traffic taxonomy

J Liu, K Fukuda - Journal of Information Processing, 2018 - jstage.jst.go.jp
To enhance Internet security, researchers have largely emphasized diverse cyberspace
monitoring approaches to observe cyber attacks and anomalies. Among them darknet …

Comparative analysis of darknet traffic characteristics between darknet sensors

F Gadhia, J Choi, B Cho, J Song - 2015 17th International …, 2015 - ieeexplore.ieee.org
Today, Internet is incessantly attacked by wide variety of network-based threats. One of the
ways to monitor or identify such prevailing threats is to monitor incoming traffic to unused …

[PDF][PDF] Monitoring Darknets for detecting malicious activities

D Yadav, N Vanjani, SK Shukla - Indian Institute of Technology Kanpur, 2017 - iitk.ac.in
In an era where every device and service is going online, cyber attacks are on a rise.
Attackers actively look for vulnerable devices and services running on the Internet. In this …

Survey on identification of malicious activities by monitoring darknet access

PS Joshi, HA Dinesha - 2020 Third International Conference on …, 2020 - ieeexplore.ieee.org
The evolutionary types of attacks generated by attacker makes it difficult to identify them.
Novel tools and techniques are required to detect, analyze, and generate reports for threat …

[HTML][HTML] Practical in-depth analysis of ids alerts for tracing and identifying potential attackers on darknet

J Song, Y Lee, JW Choi, JM Gil, J Han, SS Choi - Sustainability, 2017 - mdpi.com
The darknet (ie, a set of unused IP addresses) is a very useful solution for observing the
global trends of cyber threats and analyzing attack activities on the Internet. Since the …