Unsupervised machine learning for networking: Techniques, applications and research challenges

M Usama, J Qadir, A Raza, H Arif, KLA Yau… - IEEE …, 2019 - ieeexplore.ieee.org
While machine learning and artificial intelligence have long been applied in networking
research, the bulk of such works has focused on supervised learning. Recently, there has …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

[HTML][HTML] Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

Detecting and interpreting changes in scanning behavior in large network telescopes

M Kallitsis, R Prajapati, V Honavar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network telescopes or “Darknets” received unsolicited Internet-wide traffic, thus providing a
unique window into macroscopic Internet activities associated with malware propagation …

A study of IoT malware activities using association rule learning for darknet sensor data

S Ozawa, T Ban, N Hashimoto, J Nakazato… - International Journal of …, 2020 - Springer
Along with the proliferation of Internet of Things (IoT) devices, cyberattacks towards these
devices are on the rise. In this paper, we present a study on applying Association Rule …

DANTE: A framework for mining and monitoring darknet traffic

D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici… - … –ESORICS 2020: 25th …, 2020 - Springer
Trillions of network packets are sent over the Internet to destinations which do not exist. This
'darknet'traffic captures the activity of botnets and other malicious campaigns aiming to …

Deep neural classification of darknet traffic

M Alimoradi, M Zabihimayvan, A Daliri… - Artificial Intelligence …, 2022 - ebooks.iospress.nl
Darknet is an encrypted portion of the internet for users who intend to hide their identity.
Darknet's anonymous nature makes it an effective tool for illegal online activities such as …

Detection of Sparse Anomalies in High-Dimensional Network Telescope Signals

R Kartsioukas, R Tandon, Z Gao, J Mirkovic… - arXiv preprint arXiv …, 2022 - arxiv.org
Network operators and system administrators are increasingly overwhelmed with incessant
cyber-security threats ranging from malicious network reconnaissance to attacks such as …

3-3 Data Mining Applied to Darknet Traffic Analysis

T Ban - Journal of the National Institute of Information and …, 2017 - jstage.jst.go.jp
The proliferation of malicious soffware—so called malware—poses a major threat to the
confidentiality, integrity, and availability of the data stored and communicated using the …