2020 Mediterranean Communication and Computer Networking Conference (MedComNet) 2020
DOI: 10.1109/medcomnet49392.2020.9191555
|View full text |Cite
|
Sign up to set email alerts
|

Sensing the Noise: Uncovering Communities in Darknet Traffic

Abstract: Darknets are ranges of IP addresses advertised without answering any traffic. Darknets help to uncover interesting network events, such as misconfigurations and network scans. Interpreting darknet traffic helps against cyber-attacks -e.g., malware often reaches darknets when scanning the Internet for vulnerable devices. The traffic reaching darknets is however voluminous and noisy, which calls for efficient ways to represent the data and highlight possibly important events. This paper evaluates a methodology t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…In a nutshell, the algorithm evaluates how much more densely connected the vertices within a cluster are when compared to how connected they would be in a random network with the same degree distribution. The Louvain algorithm has been successfully used for cluster detection in social networks [33] and even for darknet traffic analysis [39]. Among its advantages, the algorithm does not require a pre-defined number of clusters.…”
Section: Clustering Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…In a nutshell, the algorithm evaluates how much more densely connected the vertices within a cluster are when compared to how connected they would be in a random network with the same degree distribution. The Louvain algorithm has been successfully used for cluster detection in social networks [33] and even for darknet traffic analysis [39]. Among its advantages, the algorithm does not require a pre-defined number of clusters.…”
Section: Clustering Methodologymentioning
confidence: 99%
“…Authors of [39] build a bipartite graph for representing darknet traffic and then apply community detection on it, obtaining clusters of autonomous systems characterized by similar behavior. These approaches are complementary to DarkVec, as they focus on particular features of the traffic.…”
Section: Related Workmentioning
confidence: 99%
“…This methodology is based on (i) exploring different types of user interactions (e.g., users who used the same hashtag sequence or who retweeted the same tweet sequence) and (ii) applying a threshold-based approach to remove edges whose weights fall below a certain threshold. This simple threshold-based backbone extraction approach has been widely used in the literature [69][70][71][72][73][74], including studies on online hate communities [12] and communities with online news exposure [10]. However, some studies point to possible misinterpretation of results when using such approach, as they may introduce bias into the analysis [72].…”
Section: Prior Studies On Network Backbone Extractionmentioning
confidence: 99%
“…The address space which is not used on the internet is called darknets or network telescopes. Darknet traffic is not speculated over the internet to interact with other computers and only passively accepts incoming packets without generating outgoing packets [5]. Tor is a virtual computer network, allows users to gain access to hidden Darknet resources.…”
Section: Introductionmentioning
confidence: 99%
“…To achieve the detection objective, authors used ML, and Deep Learning (DL) techniques [15], [16], [17], [18]. Authors in [5], [19], [20] explored whether graph mining techniques can help to uncover such macroscopic coordinated events in darknet traffic. The darknet traffic is getting complex daily, and malicious activities such as physical threats, sales data theft, fraudulent activity, phishing attacks, and scams, DDoS attacks, illicit links, Illicit Drugs, and terrorism vary day by day [21], [22], [23], [24].…”
Section: Introductionmentioning
confidence: 99%