首页 | 本学科首页   官方微博 | 高级检索  
     


Detecting and Classifying Darknet Traffic Using Deep Network Chains
Authors:Amr Munshi  Majid Alotaibi  Saud Alotaibi  Wesam Al-Sabban  Nasser Allheeib
Affiliation:1 Computer Engineering Department, Umm Al-Qura University, Mecca, Saudi Arabia2 Smart Lab, Umm Al-Qura University, Mecca, Saudi Arabia3 Information Systems Department, Umm Al-Qura University, Mecca, Saudi Arabia4 College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
Abstract:The anonymity of the darknet makes it attractive to secure communication lines from censorship. The analysis, monitoring, and categorization of Internet network traffic are essential for detecting darknet traffic that can generate a comprehensive characterization of dangerous users and assist in tracing malicious activities and reducing cybercrime. Furthermore, classifying darknet traffic is essential for real-time applications such as the timely monitoring of malware before attacks occur. This paper presents a two-stage deep network chain for detecting and classifying darknet traffic. In the first stage, anonymized darknet traffic, including VPN and Tor traffic related to hidden services provided by darknets, is detected. In the second stage, traffic related to VPNs and Tor services is classified based on their respective applications. The methodology of this paper was verified on a benchmark dataset containing VPN and Tor traffic. It achieved an accuracy of 96.8% and 94.4% in the detection and classification stages, respectively. Optimization and parameter tuning were performed in both stages to achieve more accurate results, enabling practitioners to combat alleged malicious activities and further detect such activities after outbreaks. In the classification stage, it was observed that the misclassifications were due to the audio and video streaming commonly used in shared real-time protocols. However, in cases where it is desired to distinguish between such activities accurately, the presented deep chain classifier can accommodate additional classifiers. Furthermore, additional classifiers could be added to the chain to categorize specific activities of interest further.
Keywords:Darknet  darknet traffic  deep network chains  Internet traffic
点击此处可从《计算机系统科学与工程》浏览原始摘要信息
点击此处可从《计算机系统科学与工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号