[HTML][HTML] Machine-learning-based darknet traffic detection system for IoT applications

Q Abu Al-Haija, M Krichen, W Abu Elhaija - Electronics, 2022 - mdpi.com
The massive modern technical revolution in electronics, cognitive computing, and sensing
has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …

[HTML][HTML] Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

[HTML][HTML] Darknet traffic classification and adversarial attacks using machine learning

N Rust-Nguyen, S Sharma, M Stamp - Computers & Security, 2023 - Elsevier
The anonymous nature of darknets is commonly exploited for illegal activities. Previous
research has employed machine learning and deep learning techniques to automate the …

DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification

J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …

Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection

P Dodia, M AlSabah, O Alrawi, T Wang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Tor~\citetor is the most widely used anonymous communication network with millions of
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …

Darknet Traffic Analysis: A Systematic Literature Review

J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …

[HTML][HTML] Darknet traffic analysis, and classification system based on modified stacking ensemble learning algorithms

A Almomani - Information Systems and e-Business Management, 2023 - Springer
Darknet, a source of cyber intelligence, refers to the internet's unused address space, which
people do not expect to interact with their computers. The establishment of security requires …

Evaluation of synthetic data generation techniques in the domain of anonymous traffic classification

D Cullen, J Halladay, N Briner, R Basnet… - IEEE …, 2022 - ieeexplore.ieee.org
Anonymous network traffic is more pervasive than ever due to the accessibility of services
such as virtual private networks (VPN) and The Onion Router (Tor). To address the need to …

[HTML][HTML] Towards safe cyber practices: Developing a proactive cyber-threat intelligence system for dark web forum content by identifying cybercrimes

KS Sangher, A Singh, HM Pandey, V Kumar - Information, 2023 - mdpi.com
The untraceable part of the Deep Web, also known as the Dark Web, is one of the most used
“secretive spaces” to execute all sorts of illegal and criminal activities by terrorists …

Darknet traffic classification and adversarial attacks

N Rust-Nguyen, M Stamp - arXiv preprint arXiv:2206.06371, 2022 - arxiv.org
The anonymous nature of darknets is commonly exploited for illegal activities. Previous
research has employed machine learning and deep learning techniques to automate the …