Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies 2021
DOI: 10.1145/3485983.3494863
|View full text |Cite
|
Sign up to set email alerts
|

DarkVec

Abstract: Darknets are passive probes listening to traffic reaching IP addresses that host no services. Traffic reaching them is unsolicited by nature and often induced by scanners, malicious senders and misconfigured hosts. Its peculiar nature makes it a valuable source of information to learn about malicious activities. However, the massive amount of packets and sources that reach darknets makes it hard to extract meaningful insights. In particular, multiple senders contact the darknet while performing similar and coo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…Despite promising recent applications [13], [14], [16], [18], [19], the use of self-supervised AI to learn embeddings from network data is still in its infancy. The same applies to domain adaptation on network-related tasks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite promising recent applications [13], [14], [16], [18], [19], the use of self-supervised AI to learn embeddings from network data is still in its infancy. The same applies to domain adaptation on network-related tasks.…”
Section: Related Workmentioning
confidence: 99%
“…Recent efforts have noted the similarities between sequences of events observed in network data and of words in natural languages [13], [14], [16]- [19]. Following this intuition, they leverage a two-step pipeline in which embeddings are first learned using techniques like Word2Vec [20], then used in downstream machine learning tasks.…”
Section: A Use Of Word Embeddings In Communication Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [22] introduced DarkVec, an approach to identify clusters of network probers engaged in similar probing activities. DarkVec borrows the concept of the Word2Vec model to find the embedding of a source IP address within the context of a series of IP addresses that hit the network telescope.…”
Section: B Network Telescope Traffic Classificationmentioning
confidence: 99%
“…Similar approaches have been successfully applied in other scenarios, such as code embeddings in which representations are learned from computer languages [Allamanis et al 2018]. These approaches have found several applications in cybersecurity, including for assembly code clone searching [Ding et al 2019], traffic analysis [Gioacchini et al 2021, Le et al 2022, Dietmüller et al 2022, and honeypot log interpretation [Boffa et al 2022].…”
Section: Introductionmentioning
confidence: 99%