The dark web phenomenon: A review and research agenda

A Gupta, SB Maynard, A Ahmad - arXiv preprint arXiv:2104.07138, 2021 - arxiv.org
The internet can be broadly divided into three parts: surface, deep and dark. The dark web
has become notorious in the media for being a hidden part of the web where all manner of …

BlackWidow: Monitoring the dark web for cyber security information

M Schäfer, M Fuchs, M Strohmeier… - … on Cyber Conflict …, 2019 - ieeexplore.ieee.org
The Dark Web, a conglomerate of services hidden from search engines and regular users, is
used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web …

The not so dark side of the darknet: a qualitative study

M Mirea, V Wang, J Jung - Security Journal, 2019 - Springer
In recent years, the Darknet has become one of the most discussed topics in cyber security
circles. Current academic studies and media reports tend to highlight how the anonymous …

Evolution of dark web threat analysis and detection: A systematic approach

S Nazah, S Huda, J Abawajy, MM Hassan - Ieee Access, 2020 - ieeexplore.ieee.org
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber
criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …

Honeynet-based botnet scan traffic analysis

Z Li, A Goyal, Y Chen - Botnet detection: Countering the largest security …, 2008 - Springer
In this book chapter, we demonstrated that the botnet scan traffic can be very useful in terms
of inferring the general properties of the botnets. We developed a general paradigm for …

Scanning the scanners: Sensing the internet from a massively distributed network telescope

P Richter, A Berger - Proceedings of the Internet Measurement …, 2019 - dl.acm.org
Scanning of hosts on the Internet to identify vulnerable devices and services is a key
component in many of today's cyberattacks. Tracking this scanning activity, in turn, provides …

Inferring distributed reflection denial of service attacks from darknet

C Fachkha, E Bou-Harb, M Debbabi - Computer Communications, 2015 - Elsevier
This work proposes a novel approach to infer and characterize Internet-scale DNS
Distributed Reflection Denial of Service (DRDoS) attacks by leveraging the darknet space …

[HTML][HTML] Darknet traffic classification and adversarial attacks using machine learning

N Rust-Nguyen, S Sharma, M Stamp - Computers & Security, 2023 - Elsevier
The anonymous nature of darknets is commonly exploited for illegal activities. Previous
research has employed machine learning and deep learning techniques to automate the …

Towards situational awareness of large-scale botnet probing events

Z Li, A Goyal, Y Chen, V Paxson - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Botnets dominate today's attack landscape. In this work, we investigate ways to analyze
collections of malicious probing traffic in order to understand the significance of large-scale …

[PDF][PDF] Using honeynets for internet situational awareness

V Yegneswaran, P Barford, V Paxson - … of the Fourth Workshop on Hot …, 2005 - Citeseer
Effective network security administration depends to a great extent on having accurate,
concise, high-quality information about malicious activity in one's network. Honeynets can …