2021 10th International Conference on Modern Circuits and Systems Technologies (MOCAST) 2021
DOI: 10.1109/mocast52088.2021.9493386
|View full text |Cite
|
Sign up to set email alerts
|

Darknet Traffic Classification using Machine Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Darknet, an overlay network within the internet, is accessible only through specific software, configurations, or authorization and frequently employs custom communication protocols, as expounded by Wood et al 57 Two typical types of Darknet are social networks, commonly used for peer-to-peer file hosting, and anonymity proxy networks, such as TOR, characterized by a chain of anonymized connections. 58 In their work, an extensive performance evaluation of machine learning classifiers is provided for distinguishing VPN and TOR applications employed in Darknet traffic classification. The authors also compare the performance of various machine learning models using metrics like precision, recall, F-score, confusion matrices, and ROC curves.…”
Section: Encrypted Traffic Classificationmentioning
confidence: 99%
“…Darknet, an overlay network within the internet, is accessible only through specific software, configurations, or authorization and frequently employs custom communication protocols, as expounded by Wood et al 57 Two typical types of Darknet are social networks, commonly used for peer-to-peer file hosting, and anonymity proxy networks, such as TOR, characterized by a chain of anonymized connections. 58 In their work, an extensive performance evaluation of machine learning classifiers is provided for distinguishing VPN and TOR applications employed in Darknet traffic classification. The authors also compare the performance of various machine learning models using metrics like precision, recall, F-score, confusion matrices, and ROC curves.…”
Section: Encrypted Traffic Classificationmentioning
confidence: 99%
“…Study on obfuscated Tor traffic analysis [1], [2], [3] Non-obfuscated traffic Study on non-obfuscated traffic analysis [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17] Multiple browser classification Study classifying the darknet traffic into multiple browsers [18], [19], [20] Browser settings Classification of the darknet browser through its settings [21], [22], [23], [24], [25] Padded traffic detection Classification of traffic after applying the defense mechanism [6] Traffic classification under adversarial settings Classification of Tor traffic under adversarial settings [1], [26] Application-based…”
Section: Obfuscated Trafficmentioning
confidence: 99%
“…It is a common misconception that criminals, drug users, terrorists, and sexual deviants use the Deep Web as a playground. The intranet of a firm is comparable to the deep web in the sense that no one from the outside of the company may access the information that is contained within it [14,15].…”
Section: Deep Webmentioning
confidence: 99%