Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

DANTE: A framework for mining and monitoring darknet traffic

D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici… - … –ESORICS 2020: 25th …, 2020 - Springer
Trillions of network packets are sent over the Internet to destinations which do not exist. This
'darknet'traffic captures the activity of botnets and other malicious campaigns aiming to …

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

C Han, J Takeuchi, T Takahashi, D Inoue - IEEE Access, 2022 - ieeexplore.ieee.org
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in
these cyberattacks and take suitable countermeasures quickly. The darknet, an unused IP …

A study on association rule mining of darknet big data

T Ban, M Eto, S Guo, D Inoue, K Nakao… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
Global darknet monitoring provides an effective way to observe cyber-attacks that are
significantly threatening network security and management. In this paper, we present a study …

Real-time detection of global cyberthreat based on darknet by estimating anomalous synchronization using graphical lasso

C Han, J Shimamura, T Takahashi… - … on Information and …, 2020 - search.ieice.org
With the rapid evolution and increase of cyberthreats in recent years, it is necessary to detect
and understand it promptly and precisely to reduce the impact of cyberthreats. A darknet …

Automated detection of malware activities using nonnegative matrix factorization

C Han, J Takeuchi, T Takahashi… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
Malware is increasingly diversified and sophisti-cated. It is essential to rapidly and
accurately detect malware activities when malware infection spreads. However, accurately …

FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities

YW Chang, HY Chen, C Han… - … on Emerging Topics …, 2023 - ieeexplore.ieee.org
5G networks with the vast number of devices pose security threats. Manual analysis of such
extensive security data is complex. Dark-NMF can detect malware activities by monitoring …

Detection of botnet activities through the lens of a large-scale darknet

T Ban, L Zhu, J Shimamura, S Pang, D Inoue… - … , China, November 14 …, 2017 - Springer
The growing cyber-threats from botnets compel us to devise proper countermeasures to
detect infected hosts in an efficient and timely manner. In this paper, botnet-host …

Large-scale monitoring for cyber attacks by using cluster information on darknet traffic features

H Nishikaze, S Ozawa, J Kitazono, T Ban… - Procedia Computer …, 2015 - Elsevier
This paper presents a machine learning approach to large-scale monitoring for malicious
activities on Internet. In the proposed system, network packets sent from a subnet to a …

Behavior analysis of long-term cyber attacks in the darknet

T Ban, L Zhu, J Shimamura, S Pang, D Inoue… - … , ICONIP 2012, Doha …, 2012 - Springer
Darknet monitoring provides us an effective way to countermeasure cyber attacks that pose
a significant threat to network security and management. This paper aims to characterize the …