2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 2019
DOI: 10.1109/itaic.2019.8785760
|View full text |Cite
|
Sign up to set email alerts
|

Dark web forum correlation analysis research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…In addition, there is research dedicated to network traffic classification [22][23][24], whereas the Internet of Things (IoT) has recently attracted a significant amount of attention in machine learning and in network traffic analysis [13,15,16,25]. Yang et al [26] introduce the current mainstream dark network communication system TOR and develop a visual dark web forum post association analysis system to graphically display the relationship between various forum messages and posters, which helps analysts to explore deep levels. In addition, another paper [14] designs a framework based on Hadoop in hidden threat intelligence.…”
Section: Literature Reviewsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, there is research dedicated to network traffic classification [22][23][24], whereas the Internet of Things (IoT) has recently attracted a significant amount of attention in machine learning and in network traffic analysis [13,15,16,25]. Yang et al [26] introduce the current mainstream dark network communication system TOR and develop a visual dark web forum post association analysis system to graphically display the relationship between various forum messages and posters, which helps analysts to explore deep levels. In addition, another paper [14] designs a framework based on Hadoop in hidden threat intelligence.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…The part of the internet that is not accessible by search engines is also known as the Deep Web. Darknet is a subset of the Deep Web in the sense that it is also undetectable by search engines, but it also has one characteristic [21]. Anonymous communication networks -commonly referred to as Darknets -are becoming increasingly popular with criminals for trafficking drugs, weapons, fake IDs, theft, and child pornography.…”
Section: Tor Hidden Services On Darknetmentioning
confidence: 99%
“…As far as limitations are concerned no in-depth detailed analysis of the encryption principle and anonymous implementation of the I2P protocol. Whereas in [16], authors presented I2P characteristics to point out the security flaws and problems finding artifacts of the I2P. The results shows that the I2P artifacts collected and analyzed on the basis of vulnerabilities of I2P networks and specific security issues.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A notice indicates that immediate action is required or is merely informative. Categorizing the different types of alerts is useful and makes it possible to develop a monitoring strategy [35]. Notifications are categorized according to the level of completion of the relevant research, conducted by managers and analysts.…”
Section: Visualization and User Interfacementioning
confidence: 99%