[HTML][HTML] Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural …

K Demertzis, K Tsiknas, D Takezis, C Skianis, L Iliadis - Electronics, 2021 - mdpi.com
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage
legitimate credentials with trusted tools already deployed in a network environment, making …

Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web

S Lee, C Yoon, H Kang, Y Kim, Y Kim… - … Annual Network and …, 2019 - koasas.kaist.ac.kr
The Dark Web is notorious for being a major distribution channel of harmful content as well
as unlawful goods. Perpetrators have also used cryptocurrencies to conduct illicit financial …

Automated categorization of onion sites for analyzing the darkweb ecosystem

S Ghosh, A Das, P Porras, V Yegneswaran… - Proceedings of the 23rd …, 2017 - dl.acm.org
Onion sites on the darkweb operate using the Tor Hidden Service (HS) protocol to shield
their locations on the Internet, which (among other features) enables these sites to host …

A machine learning model for classifying unsolicited IoT devices by observing network telescopes

F Shaikh, E Bou-Harb, J Crichigno… - 2018 14th International …, 2018 - ieeexplore.ieee.org
The Internet of Things [IoT] promises to revolutionize the way we interact with our
surroundings. Smart cars, smart cities, smart homes are now being realized with the help of …

Detecting and classifying online dark visual propaganda

M Hashemi, M Hall - Image and Vision Computing, 2019 - Elsevier
The staggering increase in the amount of information on the World Wide Web (referred to as
Web) has made Web page classification essential to retrieve useful information while …

[PDF][PDF] Darknet Security: A Categorization of Attacks to the Tor Network.

E Cambiaso, I Vaccari, L Patti, M Aiello - ITASEC, 2019 - ceur-ws.org
In the darknet security topic, it is important to analyze the threats that characterize the
network. This paper deeply investigates the literature of attacks against the Tor network …

Fingerprinting internet DNS amplification DDoS activities

C Fachkha, E Bou-Harb… - 2014 6th International …, 2014 - ieeexplore.ieee.org
This work proposes a novel approach to infer and characterize Internet-scale DNS
amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer …