i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis

L Gioacchini, L Vassio, M Mellia, I Drago… - ACM Transactions on …, 2023 - dl.acm.org
Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic
reaching a darknet results from the actions of internet scanners, botnets, and possibly …

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

C Han, J Takeuchi, T Takahashi, D Inoue - IEEE Access, 2022 - ieeexplore.ieee.org
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in
these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP …

[PDF][PDF] Response time optimization for vulnerability management system by combining the benchmarking and scenario planning models.

A Basuki, A Adriansyah - International Journal of Electrical & …, 2023 - academia.edu
The growth of information and communication technology has made the internet network
have many users. On the other side, this increases cybercrime and its risks. One of the main …

Darknet Analysis-Based Early Detection Framework for Malware Activity: Issue and Potential Extension

C Han, A Tanaka, T Takahashi - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Most packets arriving in the darknet (or network telescope), which is unused IP address
space on the Internet, are related to indiscriminate scanning and attack activities. In recent …

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint

A Tanaka, C Han, T Takahashi - IEEE Access, 2023 - ieeexplore.ieee.org
Adversaries perform port scanning to discover accessible and vulnerable hosts as a prelude
to cyber havoc. A darknet is a cyberattack observation network to capture these scanning …

[PDF][PDF] Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis.

C Han, A Tanaka, Jun'ichi Takeuchi, T Takahashi… - ICISSP, 2023 - scitepress.org
The darknet is an unused IP address space that can be an effective resource for observing
and analyzing global indiscriminate scanning attacks. Scanning traffic on the darknet has …

Federated learning for network traffic analysis

K Huang - 2023 - webthesis.biblio.polito.it
Darknets are formed by ranges of IP-addresses that do not host services. Darknets
constantly receive and record unsolicited traffic, making them valuable instruments to …