Robust stacking ensemble model for darknet traffic classification under adversarial settings

H Mohanty, AH Roudsari, AH Lashkari - Computers & Security, 2022 - Elsevier
Encrypted traffic tunnelled by Tor or VPN is referred to as darknet traffic. The ability to detect,
identify, and characterize darknet traffic is critical for detecting network traffic generated by a …

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection

J Lan, X Liu, B Li, J Sun, B Li, J Zhao - Computers & Security, 2022 - Elsevier
With the continuous occurrence of cybersecurity incidents, network intrusion detection has
become one of the most critical issues in cyber ecosystems. Although previous machine …

Darknet Traffic Analysis: A Systematic Literature Review

J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …

HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems

Y Li, T Qin, Y Huang, J Lan, ZH Liang, T Geng - Computers & Security, 2022 - Elsevier
Network intrusion detection plays a vital role in modern cyberspace security systems.
Although deep learning has been widely used for automatic feature extraction in intrusion …

A novel lightweight anonymous proxy traffic detection method based on spatio-temporal features

Y He, W Li - Sensors, 2022 - mdpi.com
Anonymous proxies are used by criminals for illegal network activities due to their
anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic …

Empowering smart city situational awareness via big mobile data

Z Shan, L Shi, B Li, Y Zhang, X Zhang… - Frontiers of Information …, 2023 - Springer
Smart city situational awareness has recently emerged as a hot topic in research societies,
industries, and governments because of its potential to integrate cutting-edge information …

FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling

L He, L Wang, K Cheng, Y Xu - IET Information Security, 2023 - Wiley Online Library
Tor traffic tracking is valuable for combating cybercrime as it provides insights into the traffic
active on the Tor network. Tor‐based application traffic classification is one of the tracking …

Fine-grained traffic classification based on improved residual convolutional network in software defined networks

C Su, Y Liu, X Xie - IEEE Latin America Transactions, 2023 - ieeexplore.ieee.org
As Internet traffic becomes increasingly complex, a growing number of applications are
carrying different services. To provides service-aware traffic classification, allowing network …

Darknet traffic classification with machine learning algorithms and SMOTE method

H Karagöl, O Erdem, B Akbas… - 2022 7th International …, 2022 - ieeexplore.ieee.org
The Darknet is a network that can be accessed with certain privileges and runs a non-
standard communication protocol. The Darknet traffic that consists of data from several …

[HTML][HTML] Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis

A Mezina, R Burget, A Ometov - Computer Networks, 2024 - Elsevier
With a growing number of smart interconnected devices and services, managing and
controlling network traffic is getting more complicated. Among the network traffic, the Darknet …