2013
DOI: 10.1002/sec.796
|View full text |Cite
|
Sign up to set email alerts
|

A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic

Abstract: In general, attackers carry out scanning or probing against a certain network when they start to attack their victims. Because of this, darknet is very useful to observe the scanning activities of attackers who want to find their victims that have security vulnerabilities in operating systems, applications, services, and so on. Thus, by observing and analyzing darknet traffic, it is able to obtain an insight into malicious activities that are happening on the Internet and to identify potential attackers who se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…In prior research [1], [2], [14], [7], [15], [10], [9], [16], [17], [5], [18], [19], darknet data is used to detect botnet hosts, typically by clustering and classifying the src IPs with features such as the dst port and packet size.…”
Section: A Mining Darknet Trafficmentioning
confidence: 99%
See 1 more Smart Citation
“…In prior research [1], [2], [14], [7], [15], [10], [9], [16], [17], [5], [18], [19], darknet data is used to detect botnet hosts, typically by clustering and classifying the src IPs with features such as the dst port and packet size.…”
Section: A Mining Darknet Trafficmentioning
confidence: 99%
“…Unlike other methods that used darknet data streams, e.g. [18], DANTE is not trying to find anomalies on specific ports, but rather find concepts and trends in the data. While methods that find correlations between ports exist [13], (1) they operate offline detecting patterns months after the fact, and (2) do not track the patterns over time.…”
Section: Analysis Of Darknet Trafficmentioning
confidence: 99%
“…This result means that the proposed verification methodology can contribute to detection of true negatives that were not identified by the security analyst. Some examples of the 140 true negatives can be referred from our previous work [17].…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In addition, we carried out a practical correlation analysis of IDS alerts and the darknet traffic, focusing on internal hosts that sent packet(s) to the darknet and showed how security operators are able to effectively identify internal attack hosts using the darknet traffic [13]. However, we did not provide any detailed information about the attack activities of the internal attack hosts and did not inspect them using security software.…”
Section: Introductionmentioning
confidence: 99%