Title: Early Detection of Darknet Traffic in Internet of Things Applications
Abstract: Chapter 7 Early Detection of Darknet Traffic in Internet of Things Applications N. Ambika, N. Ambika St. Francis College, Department of Computer Science & Applications, Bangalore, IndiaSearch for more papers by this author N. Ambika, N. Ambika St. Francis College, Department of Computer Science & Applications, Bangalore, IndiaSearch for more papers by this author Book Editor(s):Amit Kumar Tyagi, Amit Kumar Tyagi National Institute of Fashion Technology, New Delhi, IndiaSearch for more papers by this author First published: 16 November 2023 https://doi.org/10.1002/9781394213948.ch7 AboutPDFPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShareShare a linkShare onEmailFacebookTwitterLinkedInRedditWechat Summary A darknet IDS system that employs supervised machine learning identifies common Internet of Things (IoT) cyber attacks’ darknet activities in the work. Using a pipeline of pre-processing stages that begin with the data accumulation process, characteristic commerce is the choice, management, and alteration of fresh information into properties. These are fed into the machine learning procedures for further computation, exercise, authentication, and forecast. The CSV version of the CIC-DarkNet-2020 database is initially available. The platform developed by MATLAB processes it. It gains a deeper understanding of the dataset using exploratory data analysis and performs essential data curation tasks. By envisaging the info sessions’ histograms to obtain additional visions into the categories and characteristics, this procedure finishes an initial improvement procedure of the database by validating for misplaced facts and obtaining appropriate substitutions for the missing records. The CIC-DarkNet-2020 dataset's most influential features are extracted using the coefficient score method to find the best features for exercise and confirm the knowledge representations later. Detail points are rescaled using normalization to maintain the same range and significance. The process of transforming unconditional statistics into arithmetic facts that machine learning techniques can process is known as label encoding. By haphazardly reorganising information from a database, the shambling procedure is a pre-processing procedure carried out over the knowledge examples. It produces a novel planning for the database that can be used securely for machine learning evaluation and exercise without the classifier being prejudiced toward any of the primary courses. It carried out a k-fold cross-endorsement procedure with five distinct folds. The suggestion cuts down the steps by speeding the process by 24%. It uses a sample dataset collected from various sources. This dataset consists of a set mapping the intention of the malicious content to its behavior. This dataset is mapped to draw out the outcome of the collected darknet dataset. References Ambika , N. , Precise risk assessment and management , in: Cyber-Physical Systems: Foundations and Techniques , pp. 63 – 83 , Wiley , Canada , 2022 . 10.1002/9781119836636.ch4 Google Scholar Fachkha , C. and Debbabi , M. , Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization . IEEE Commun. Surv. & Tutorials , 18 , 2 , 1197 – 1227 , 2015 . 10.1109/COMST.2015.2497690 Web of Science®Google Scholar Ambika , N. , Minimum prediction error at an early stage in darknet analysis , in: Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence , pp. 18 – 30 , IGI Global , US , 2022 . 10.4018/978-1-6684-3942-5.ch002 Google Scholar Demertzis , K. , Tsiknas , K. , Takezis , D. , Skianis , C. , Iliadis , L. , Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks framework . Electronics , 10 , 7 , 781 , 2021 . 10.3390/electronics10070781 Web of Science®Google Scholar Chen , H. , Chung , W. , Qin , J. , Reid , E. , Sageman , M. , Weimann , G. , Uncovering the dark web: A case study of Jihad on the web . J. Am. Soc. Inf. Sci. Technol. , 59 , 8 , 1347 – 1359 , 2008 . 10.1002/asi.20838 Web of Science®Google Scholar Chen , H. , IEDs in the Dark web: Genre classification of improvised explosive device web pages , in: IEEE International Conference on Intelligence and Security Informatics , Taipei, Taiwan , 2008 . 10.1109/ISI.2008.4565036 Google Scholar Samtani , S. , Li , W. , Benjamin , V. , Chen , H. , Informing cyber threat intelligence through dark web situational awareness: The AZSecure hacker assets portal . Digital Threats: Res. Pract. (DTRAP) , 2 , 4 , 1 – 10 , 2021 . 10.1145/3450972 Google Scholar Faizan , M. and Khan , R.A. , Exploring and analyzing the dark web: A new alchemy . First Monday, Chicago , 2021 , 1 – 5 , 2019 . Google Scholar Tavabi , N. , Bartley , N. , Abeliuk , A. , Soni , S. , Ferrara , E. , Lerman , K. , Characterizing activity on the deep and dark web , in, Characterizing Activity on the Deep and Dark Web , San Francisco ACM, USA , 2019 . 10.1145/3308560.3316502 Google Scholar Nishikaze , H. , Ozawa , S. , Kitazono , J. , Ban , T. , Nakazato , J. , Shimamura , J. , Large-scale monitoring for cyber attacks by using cluster information on darknet traffic features , in: INNS Conference on Big Data , San Francisco, Elsevier, CA, USA , 2015 . Google Scholar Ebrahimi , M. , Surdeanu , M. , Samtani , S. , Chen , H. , Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach , in: International Conference on Intelligence and Security Informatics (ISI) , Miami, FL, USA , 2018 . Google Scholar Al-Haija , Q.A. , Smadi , M. , Al-Bataineh , O.M. , Identifying phasic dopamine releases using DarkNet-19 convolutional neural network , in: International IOT, Electronics and Mechatronics Conference (IEMTRONICS) , Toronto, ON, Canada , 2021 . Google Scholar Abu Al-Haija , Q. , Krichen , M. , Abu Elhaija , W. , Machine-learning-based darknet traffic detection system for iot applications . Electronics , 11 , 4 , 556 , 2022 . 10.3390/electronics11040556 Web of Science®Google Scholar Nunes , E. , Diab , A. , Gunn , A. , Marin , E. , Mishra , V. , Paliath , V. , Robertson , J. , Shakarian , J. , Thart , A. , Shakarian , P. , Darknet and deepnet mining for proactive cybersecurity threat intelligence , in: IEEE Conference on Intelligence and Security Informatics (ISI) , Tucson, AZ, USA , 2016 . 10.1109/ISI.2016.7745435 Google Scholar Rawat , R. , Mahor , V. , Chirgaiya , S. , Shaw , R.N. , Ghosh , A. , Analysis of darknet traffic for criminal activities detection using TF-IDF and light gradient boosted machine learning algorithm , in: Innovations in Electrical and Electronic Engineering , pp. 671 – 681 , Springer , Singapore , 2021 . 10.1007/978-981-16-0749-3_53 Google Scholar Habibi Lashkari , A. , Kaur , G. , Rahali , A. , DIDarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning , in: 10th International Conference on Communication and Network Security , ACM , Tokyo Japan , 2020 . 10.1145/3442520.3442521 Google Scholar Kadoguchi , M. , Hayashi , S. , Hashimoto , M. , Otsuka , A. , Exploring the dark web for cyber threat intelligence using machine leaning , in: International Conference on Intelligence and Security Informatics (ISI) , Shenzhen, China , 2019 . 10.1109/ISI.2019.8823360 Google Scholar Schäfer , M. , Fuchs , M. , Strohmeier , M. , Engel , M. , Liechti , M. , Lenders , V. , BlackWidow: Monitoring the dark web for cyber security information , in: 11th International Conference on Cyber Conflict (CyCon) , Tallinn, Estonia , 2019 . 10.23919/CYCON.2019.8756845 Google Scholar Ma , H. , Cao , J. , Mi , B. , Huang , D. , Liu , Y. , Zhang , Z. , Dark web traffic detection method based on deep learning , in: 10th Data Driven Control and Learning Systems Conference (DDCLS) , Suzhou, China , 2021 . 10.1109/DDCLS52934.2021.9455619 Google Scholar Kadoguchi , M. , Kobayashi , H. , Hayashi , S. , Otsuka , A. , Hashimoto , M. , Deep self-supervised clustering of the dark web for cyber threat intelligence , in: International Conference on Intelligence and Security Informatics (ISI) , Arlington, VA, USA , 2020 . Google Scholar Rust-Nguyen , N. , Sharma , S. , Stamp , M. , Darknet traffic classification and adversarial attacks using machine learning . Comput. & Secur. , 127 , 103098 , 2023 . 10.1016/j.cose.2023.103098 Web of Science®Google Scholar Kumar , S. , Vranken , H. , van Dijk , J. , Hamalainen , T. , Deep in the dark: A novel threat detection system using darknet traffic , in: International Conference on Big Data (Big Data) , Los Angeles, CA, USA , 2019 . 10.1109/BigData47090.2019.9006374 Google Scholar Ebrahimi , M. , N , J.F. , Jr , Chen , H. , Semi-supervised cyber threat identification in dark net markets: A transductive and deep learning approach . J. Manag. Inf. Syst. , 37 , 3 , 694 – 722 , 2020 . 10.1080/07421222.2020.1790186 Web of Science®Google Scholar Sarwar , M.B. , Hanif , M.K. , Talib , R. , Younas , M. , Sarwar , M.U. , DarkDetect: Darknet traffic detection and categorization using modified convolution-long short-term memory . IEEE Access , 9 , 113705 – 113713 , 2021 . 10.1109/ACCESS.2021.3105000 Web of Science®Google Scholar Li , R. , Chen , S. , Yang , J. , Luo , E. , Edge-based detection and classification of malicious contents in tor darknet using machine learning . Mobile Inf. Syst. , 2021 , 1 – 13 , 2021 . 10.1155/2021/1430512 Web of Science®Google Scholar Gao , M. and Mok , R.K. , A scalable network event detection framework for darknet traffic , in: 22nd ACM Internet Measurement Conference , France , 2022 . 10.1145/3517745.3563015 Google Scholar Nagaraj , A. , Introduction to sensors in IoT and cloud computing applications , Bentham Science Publishers , UAE , 2021 . 10.2174/97898114793591210101 Google Scholar Nagaraj , A. , Adapting blockchain for energy constrained IoT in healthcare environment , in: Sustainable and Advanced Applications of Blockchain in Smart Computational Technologie , p. 103 , CRC Press , Boca Raton, Florida , 2022 . 10.1201/9781003193425-7 Google Scholar Automated Secure Computing for Next‐Generation Systems ReferencesRelatedInformation
Publication Year: 2023
Publication Date: 2023-11-16
Language: en
Type: other
Indexed In: ['crossref']
Access and Citation
Cited By Count: 4
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot