2020
DOI: 10.1007/978-3-030-58951-6_5
|View full text |Cite
|
Sign up to set email alerts
|

DANTE: A Framework for Mining and Monitoring Darknet Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…A common feature of router vulnerability types is that there are many cases wherein each router manufacturer's login screen was confirmed when an HTTP connection was made to the source hosts that sent the scan. Cohen et al [24] also identified that ports 5379, 6379, and 7379 were observed during the same period. Please refer to that previous paper for more details, including time-series graphs of the unique host counts of malware activities in this ground truth.…”
Section: A Details Of Datasetmentioning
confidence: 87%
See 4 more Smart Citations
“…A common feature of router vulnerability types is that there are many cases wherein each router manufacturer's login screen was confirmed when an HTTP connection was made to the source hosts that sent the scan. Cohen et al [24] also identified that ports 5379, 6379, and 7379 were observed during the same period. Please refer to that previous paper for more details, including time-series graphs of the unique host counts of malware activities in this ground truth.…”
Section: A Details Of Datasetmentioning
confidence: 87%
“…2004: A spike of 300 hosts was observed on October 15 (window size=14600, 29200). 5379,6379,7379: Spikes of 1K hosts were observed on October 31 for each port [24].…”
Section: B Parameter Tuning In Dark-ntdmentioning
confidence: 99%
See 3 more Smart Citations