Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication channels. Effective detection of clandestine darknet traffic is therefore critical yet immensely challenging. This research demonstrates how advanced machine learning and specialized deep learning techniques can significantly enhance darknet traffic analysis to strengthen cybersecurity. Combining diverse classifiers such as random forest and naïve Bayes with a novel spiking neural network architecture provides a robust foundation for identifying concealed threats. Evaluation on the CIC-Darknet2020 dataset establishes state-of-the-art results with 98% accuracy from the random forest model and 84.31% accuracy from the spiking neural network. This pioneering application of artificial intelligence advances the frontiers in analyzing the complex characteristics and behaviours of darknet communication. The proposed techniques lay the groundwork for improved threat intelligence, real-time monitoring, and resilient cyber defense systems against the evolving landscape of cyber threats.
R. Niranjana, V. A. Kumar, and S. Sheen, Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm, SN Comput. Sci., vol. 1, no. 1, p. 16, 2019.
C. Fachkha and M. Debbabi, Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization, IEEE Commun. Surv. Tutor., vol. 18, no. 2, pp. 1197–1227, 2016.
J. Hawdon, Cybercrime: victimization, perpetration, and techniques, Am. J. Crim. Justice, vol. 46, no. 6, pp. 837–842, 2021.
Q. Abu Al-Haija, M. Krichen, and W. Abu Elhaija, Machine-learning-based darknet traffic detection system for IoT applications, Electronics, vol. 11, no. 4, p. 556, 2022.
E. Figueras-Martín, R. Magán-Carrión, and J. Boubeta-Puig, Drawing the web structure and content analysis beyond the tor darknet: Freenet as a case of study, J. Inf. Secur. Appl., vol. 68, p. 103229, 2022.
M. B. Sarwar, M. K. Hanif, R. Talib, M. Younas, and M. U. Sarwar, DarkDetect: Darknet traffic detection and categorization using modified convolution-long short-term memory, IEEE Access, vol. 9, pp. 113705–113713, 2021.
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, SMOTE: synthetic minority over-sampling technique, J. Artif. Intell. Res., vol. 16, pp. 321–357, 2002.
H. Mohanty, A. H. Roudsari, and A. H. Lashkari, Robust stacking ensemble model for darknet traffic classification under adversarial settings, Comput. Secur., vol. 120, p. 102830, 2022.
J. Lan, X. Liu, B. Li, Y. Li, and T. Geng, DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification, Comput. Secur., vol. 116, p. 102663, 2022.
Z. H. Zhou and J. Feng, Deep forest, Natl. Sci. Rev., vol. 6, no. 1, pp. 74–86, 2019.
M. Coutinho Marim, P. V. B. Ramos, A. B. Vieira, A. Galletta, M. Villari, R. M. de Oliveira, and E. F. Silva, Darknet traffic detection and characterization with models based on decision trees and neural networks, Intell. Syst. Appl., vol. 18, p. 200199, 2023.
N. Rust-Nguyen, S. Sharma, and M. Stamp, Darknet traffic classification and adversarial attacks using machine learning, Comput. Secur., vol. 127, p. 103098, 2023.
A. Almomani, Darknet traffic analysis, and classification system based on modified stacking ensemble learning algorithms, Inf. Syst. e-Bus. Manag., pp. 1–32, 2023.
R. Li, S. Chen, J. Yang, and E. Luo, Edge-based detection and classification of malicious contents in tor darknet using machine learning, Mob. Inf. Syst., vol. 2021, p. 8072779, 2021.
K. Demertzis, K. Tsiknas, D. Takezis, C. Skianis, and L. Iliadis, Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks framework, Electronics, vol. 10, no. 7, pp. 781, 2021.
X. Tong, C. Zhang, J. Wang, Z. Zhao, and Z. Liu, Dark-forest: Analysis on the behavior of dark web traffic via DeepForest and PSO algorithm, Comput. Model. Eng. Sci., vol. 135, no. 1, pp. 561–581, 2023.
A. Naik and L. Samant, Correlation review of classification algorithm using data mining tool: WEKA, rapidminer, Tanagra, orange and knime, Procedia Comput. Sci., vol. 85, pp. 662–668, 2016.
N. K. Kasabov, NeuCube: A spiking neural network architecture for mapping, learning and understanding of spatio-temporal brain data, Neural Netw., vol. 52, pp. 62–76, 2014.
C. Tan, M. Šarlija, and N. Kasabov, Spiking neural networks: Background, recent development and the NeuCube architecture, Neural Process. Lett., vol. 52, no. 2, pp. 1675–1701, 2020.
S. Song, K. D. Miller, and L. F. Abbott, Competitive Hebbian learning through spike-timing-dependent synaptic plasticity, Nat. Neurosci., vol. 3, no. 9, pp. 919–926, 2000.
This work is available under the CC BY-NC-ND 3.0 IGO license:https://creativecommons.org/licenses/by-nc-nd/3.0/igo/