匿名通信与暗网综合治理.

兰浩良, 李馥娟, 王群, 印杰, 徐杰… - Journal of Frontiers …, 2022 - search.ebscohost.com
匿名通信所具有的节点发现难, 服务定位难, 通信关系确认难以及用户监控难等特点使得架构在
其之上的暗网中充斥着各种匿名滥用的违法犯罪活动. 为此, 学术界围绕匿名通信与暗网开展了 …

[PDF][PDF] Dark Web y Deep Web como fuentes de ciberinteligencia utilizando minería de datos

EM Ibáñez - 3ª ÉPOCA, 2017 - gcivil.orex.es
Deep Web es la parte más grande de Internet, cuyos contenidos no pueden indexar los
buscadores web convencionales; puede servir para actividades legales e ilegales. Dark …

Malicious host detection by imaging SYN packets and a neural network

R Nakamura, Y Sekiya, D Miyamoto… - 2018 International …, 2018 - ieeexplore.ieee.org
As is the case for recently networked systems, traffic analysis that detects malicious hosts is
one of the most important issues in achieving better security. Many methods for detecting …

Minimum prediction error at an early stage in darknet analysis

N Ambika - Dark Web Pattern Recognition and Crime Analysis …, 2022 - igi-global.com
The previous work adopts an evolving methodology in neural system. The chapter is a new
darknet transactions summary. It is a system administration structure for real-time automating …

Modeling of ip scanning activities with hidden markov models: Darknet case study

G De Santis, A Lahmadi, J Francois… - 2016 8th IFIP …, 2016 - ieeexplore.ieee.org
We propose a methodology based on Hidden Markov Models (HMMs) to model scanning
activities monitored by a darknet. The HMMs of scanning activities are built on the basis of …

On correlating network traffic for cyber threat intelligence: A Bloom filter approach

A Atifi, E Bou-Harb - 2017 13th International Wireless …, 2017 - ieeexplore.ieee.org
Internet and organizational network security is still threatened by devastating malicious
activities. Given the continuous escalation of such attacks in terms of their frequency …

Quantitative and qualitative evaluation of TCP target ports through active network telescope

M Kori, VA Kumar, R Pachouri, A Jain… - International Journal of …, 2024 - Springer
Network Telescopes is emerging as one of the popular tools amongst security researchers
world-wide. Internet traffic destined to a routable, yet unused address block is often referred …

Detecting Coordinated Internet-Wide Scanning by TCP/IP Header Fingerprint

A Tanaka, C Han, T Takahashi - IEEE Access, 2023 - ieeexplore.ieee.org
Adversaries perform port scanning to discover accessible and vulnerable hosts as a prelude
to cyber havoc. A darknet is a cyberattack observation network to capture these scanning …

Cloud Telescope: A distributed architecture for capturing Internet Background Radiation

F Bortoluzzi, B Irwin, LS Beiler… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
Internet Background Radiation (IBR) comprises a range of unsolicited traffic directed
towards Internet hosts. In general, this type of traffic is characterised by high levels of port …

An FPGA architecture for ASIC-FPGA Co-design to streamline processing of IDSs

T Sato, S Chivapreecha, P Moungnoul… - … and Systems (CTS), 2016 - ieeexplore.ieee.org
Novel methods for unauthorized access are always made. For cyber security measures in
mobile devices, low-power and high-speed processing is very important. Despite these …