Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Are darknets all the same? On darknet visibility for security monitoring

F Soro, I Drago, M Trevisan, M Mellia… - … symposium on local …, 2019 - ieeexplore.ieee.org
Darknets are sets of IP addresses that are advertised but do not host any client or server. By
passively recording the incoming packets, they assist network monitoring activities. Since …

DANTE: A framework for mining and monitoring darknet traffic

D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici… - … –ESORICS 2020: 25th …, 2020 - Springer
Trillions of network packets are sent over the Internet to destinations which do not exist. This
'darknet'traffic captures the activity of botnets and other malicious campaigns aiming to …

Practical darknet measurement

M Bailey, E Cooke, F Jahanian… - 2006 40th Annual …, 2006 - ieeexplore.ieee.org
The Internet today is beset with constant attacks targeting users and infrastructure. One
popular method of detecting these attacks and the infected hosts behind them is to monitor …

[PDF][PDF] DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.

V Benjamin, JS Valacich, H Chen - Mis Quarterly, 2019 - ailab-ua.github.io
Society's growing dependence on computers and information technologies has been
matched by an escalation of the frequency and sophistication of cyber attacks committed by …

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation

C Fachkha, E Bou-Harb, A Boukhtouta… - … Conference on Risks …, 2012 - ieeexplore.ieee.org
An effective approach to gather cyber threat intelligence is to collect and analyze traffic
destined to unused Internet addresses known as darknets. In this paper, we elaborate on …

[HTML][HTML] Machine-learning-based darknet traffic detection system for IoT applications

Q Abu Al-Haija, M Krichen, W Abu Elhaija - Electronics, 2022 - mdpi.com
The massive modern technical revolution in electronics, cognitive computing, and sensing
has provided critical infrastructure for the development of today's Internet of Things (IoT) for a …

[PDF][PDF] Data reduction for the scalable automated analysis of distributed darknet traffic

M Bailey, E Cooke, F Jahanian, N Provos… - Proceedings of the 5th …, 2005 - usenix.org
Threats to the privacy of users and to the availability of Internet infrastructure are evolving at
a tremendous rate. To characterize these emerging threats, researchers must effectively …

[图书][B] Darkweb cyber threat intelligence mining

J Robertson, A Diab, E Marin, E Nunes, V Paliath… - 2017 - books.google.com
The important and rapidly emerging new field known as' cyber threat intelligence'explores
the paradigm that defenders of computer networks gain a better understanding of their …

DarkVec: Automatic analysis of darknet traffic with word embeddings

L Gioacchini, L Vassio, M Mellia, I Drago… - Proceedings of the 17th …, 2021 - dl.acm.org
Darknets are passive probes listening to traffic reaching IP addresses that host no services.
Traffic reaching them is unsolicited by nature and often induced by scanners, malicious …