i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis

L Gioacchini, L Vassio, M Mellia, I Drago… - ACM Transactions on …, 2023 - dl.acm.org
Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic
reaching a darknet results from the actions of internet scanners, botnets, and possibly …

DarkVec: Automatic analysis of darknet traffic with word embeddings

L Gioacchini, L Vassio, M Mellia, I Drago… - Proceedings of the 17th …, 2021 - dl.acm.org
Darknets are passive probes listening to traffic reaching IP addresses that host no services.
Traffic reaching them is unsolicited by nature and often induced by scanners, malicious …

[PDF][PDF] Data reduction for the scalable automated analysis of distributed darknet traffic

M Bailey, E Cooke, F Jahanian, N Provos… - Proceedings of the 5th …, 2005 - usenix.org
Threats to the privacy of users and to the availability of Internet infrastructure are evolving at
a tremendous rate. To characterize these emerging threats, researchers must effectively …

Sensing the noise: Uncovering communities in darknet traffic

F Soro, M Allegretta, M Mellia, I Drago… - 2020 Mediterranean …, 2020 - ieeexplore.ieee.org
Darknets are ranges of IP addresses advertised without answering any traffic. Darknets help
to uncover interesting network events, such as misconfigurations and network scans …

A scalable network event detection framework for darknet traffic

M Gao, RKP Mok - Proceedings of the 22nd ACM Internet Measurement …, 2022 - dl.acm.org
Unsolicited network traffic captured by network telescopes, namely darknet traffic, provides
important data for studying malicious Internet activities, such as network scanning [9], the …

A probabilistic model to preprocess darknet data for cyber threat intelligence generation

E Bou-Harb - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
Internet traffic destined to routable yet unallocated IP addresses is commonly referred to as
telescope or darknet data. Such unsolicited traffic is frequently, abundantly and effectively …

DANTE: A framework for mining and monitoring darknet traffic

D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici… - … –ESORICS 2020: 25th …, 2020 - Springer
Trillions of network packets are sent over the Internet to destinations which do not exist. This
'darknet'traffic captures the activity of botnets and other malicious campaigns aiming to …

Darkdetect: Darknet traffic detection and categorization using modified convolution-long short-term memory

MB Sarwar, MK Hanif, R Talib, M Younas… - IEEE …, 2021 - ieeexplore.ieee.org
Darknet is commonly known as the epicenter of illegal online activities. An analysis of
darknet traffic is essential to monitor real-time applications and activities running over the …

Towards a taxonomy of darknet traffic

J Liu, K Fukuda - 2014 International Wireless Communications …, 2014 - ieeexplore.ieee.org
Darknets can be used to monitor unexpected network traffic destined for allocated but
unused IP address blocks, thus providing an effective traffic measurement technique for …

DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification

J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …