DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …
defensing cyber crimes. Although notable research efforts have been dedicated to …
Detecting and interpreting changes in scanning behavior in large network telescopes
Network telescopes or “Darknets” received unsolicited Internet-wide traffic, thus providing a
unique window into macroscopic Internet activities associated with malware propagation …
unique window into macroscopic Internet activities associated with malware propagation …
Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …
it remains an area showing silos and reserved for large organizations. For an area whose …
NTARC: a data model for the systematic review of network traffic analysis research
The increased interest in secure and reliable communications has turned the analysis of
network traffic data into a predominant topic. A high number of research papers propose …
network traffic data into a predominant topic. A high number of research papers propose …
Analysis of lightweight feature vectors for attack detection in network traffic
F Meghdouri, T Zseby, F Iglesias - Applied Sciences, 2018 - mdpi.com
Featured Application Optimal design of feature vectors for early-phase attack detection in
large communication networks. Abstract The consolidation of encryption and big data in …
large communication networks. Abstract The consolidation of encryption and big data in …
Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm
R Niranjana, VA Kumar, S Sheen - SN Computer Science, 2020 - Springer
The cyberspace continues to evolve more complex than ever anticipated, and same is the
case with security dynamics there. As our dependence on cyberspace is increasing day-by …
case with security dynamics there. As our dependence on cyberspace is increasing day-by …
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …
SDOoop: capturing periodical patterns and out-of-phase anomalies in streaming data analysis
Streaming data analysis is increasingly required in applications, eg, IoT, cybersecurity,
robotics, mechatronics or cyber-physical systems. Despite its relevance, it is still an …
robotics, mechatronics or cyber-physical systems. Despite its relevance, it is still an …
Shedding light into the darknet: scanning characterization and detection of temporal changes
Network telescopes provide a unique window into Internet-wide malicious activities
associated with malware propagation, denial of service attacks, network reconnaissance …
associated with malware propagation, denial of service attacks, network reconnaissance …
Are network attacks outliers? a study of space representations and unsupervised algorithms
Among network analysts,“anomaly” and “outlier” are terms commonly associated to network
attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication …
attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication …