DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification

J Lan, X Liu, B Li, Y Li, T Geng - Computers & Security, 2022 - Elsevier
Darknet traffic classification is crucial for identifying anonymous network applications and
defensing cyber crimes. Although notable research efforts have been dedicated to …

Detecting and interpreting changes in scanning behavior in large network telescopes

M Kallitsis, R Prajapati, V Honavar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Network telescopes or “Darknets” received unsolicited Internet-wide traffic, thus providing a
unique window into macroscopic Internet activities associated with malware propagation …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

NTARC: a data model for the systematic review of network traffic analysis research

F Iglesias, DC Ferreira, G Vormayr, M Bachl, T Zseby - Applied Sciences, 2020 - mdpi.com
The increased interest in secure and reliable communications has turned the analysis of
network traffic data into a predominant topic. A high number of research papers propose …

Analysis of lightweight feature vectors for attack detection in network traffic

F Meghdouri, T Zseby, F Iglesias - Applied Sciences, 2018 - mdpi.com
Featured Application Optimal design of feature vectors for early-phase attack detection in
large communication networks. Abstract The consolidation of encryption and big data in …

Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm

R Niranjana, VA Kumar, S Sheen - SN Computer Science, 2020 - Springer
The cyberspace continues to evolve more complex than ever anticipated, and same is the
case with security dynamics there. As our dependence on cyberspace is increasing day-by …

DKaaS: DARK-KERNEL as a service for active cyber threat intelligence

PVS Charan, G Ratnakaram, H Chunduri… - Computers & …, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) plays an indispensable role in providing evidence-
based knowledge to plan defensive strategies against advanced cyber attacks. Most threat …

SDOoop: capturing periodical patterns and out-of-phase anomalies in streaming data analysis

A Hartl, FI Vázquez, T Zseby - arXiv preprint arXiv:2409.02973, 2024 - arxiv.org
Streaming data analysis is increasingly required in applications, eg, IoT, cybersecurity,
robotics, mechatronics or cyber-physical systems. Despite its relevance, it is still an …

Shedding light into the darknet: scanning characterization and detection of temporal changes

R Prajapati, V Honavar, D Wu, J Yen… - Proceedings of the 17th …, 2021 - dl.acm.org
Network telescopes provide a unique window into Internet-wide malicious activities
associated with malware propagation, denial of service attacks, network reconnaissance …

Are network attacks outliers? a study of space representations and unsupervised algorithms

F Iglesias, A Hartl, T Zseby, A Zimek - Joint European Conference on …, 2019 - Springer
Among network analysts,“anomaly” and “outlier” are terms commonly associated to network
attacks. Attacks are outliers (or anomalies) in the sense that they exploit communication …