The World Wide Web (www) consists of the surface web, deep web, and Dark Web, depending on the content shared and the access to these network layers. Dark Web consists …
N Rust-Nguyen, S Sharma, M Stamp - Computers & Security, 2023 - Elsevier
The anonymous nature of darknets is commonly exploited for illegal activities. Previous research has employed machine learning and deep learning techniques to automate the …
J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and defensing cyber crimes. Although notable research efforts have been dedicated to …
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making …
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
MB Sarwar, MK Hanif, R Talib, M Younas… - IEEE …, 2021 - ieeexplore.ieee.org
Darknet is commonly known as the epicenter of illegal online activities. An analysis of darknet traffic is essential to monitor real-time applications and activities running over the …
X Deng, J Zhu, X Pei, L Zhang, Z Ling… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Given the distributed nature of the massively connected “Things” in IoT, IoT networks have been a primary target for cyberattacks. Although machine learning based network intrusion …
L Chang, P Branco - arXiv preprint arXiv:2111.13597, 2021 - arxiv.org
The high volume of increasingly sophisticated cyber threats is drawing growing attention to cybersecurity, where many challenges remain unresolved. Namely, for intrusion detection …
Encrypted traffic tunnelled by Tor or VPN is referred to as darknet traffic. The ability to detect, identify, and characterize darknet traffic is critical for detecting network traffic generated by a …