Darknet traffic detection and characterization with models based on decision trees and neural networks

被引:5
作者
Marim, Mateus Coutinho [1 ]
Ramos, Paulo Vitor Barbosa [1 ]
Vieira, Alex B. [1 ]
Galletta, Antonino [2 ]
Villari, Massimo [2 ]
de Oliveira, Roberto M. [1 ]
Silva, Edelberto Franco [1 ]
机构
[1] Fed Univ Juiz de Fora UFJF, Dept Comp Sci, Grad Program Comp Sci PPGCC, Juiz De Fora, MG, Brazil
[2] Univ Messina, MIFT Dept, Viale F Stagno Alcontres 31, I-98166 Messina, Italy
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2023年 / 18卷
关键词
Traffic classification; Darknet; Security; Deep web; Neural networks; Benchmark;
D O I
10.1016/j.iswa.2023.200199
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Darknet is a set of networks and technologies, having as fundamental principles anonymity and security. In many cases, they are associated with illicit activities, opening space for malware traffic and attacks to legitimate services. To prevent Darknet misuse is necessary to classify and characterize its existing traffic. In this paper, we characterize and classify the real Darknet traffic available from the CIC-Darknet2020 dataset. In that sense, we performed the feature extraction and grouped the possible subnets with an n-gram approach. Furthermore, we evaluated the relevance of the best features selected by the Recursive Feature Elimination method for the problem. Our results indicate that simple models, like Decision Trees and Random Forests, reach an accuracy above 99% on traffic classification. Our methodology represents a gain of up to 13% in comparison with the state-of-the-art.
引用
收藏
页数:11
相关论文
共 20 条
  • [1] A Big Data-Enabled Hierarchical Framework for Traffic Classification
    Bovenzi, Giampaolo
    Aceto, Giuseppe
    Ciuonzo, Domenico
    Persico, Valerio
    Pescape, Antonio
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2608 - 2619
  • [2] Traffic classification through simple statistical fingerprinting.
    Crotti, Manuel
    Dusi, Maurizio
    Gringoli, Francesco
    Salgarelli, Luca
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (01) : 5 - 16
  • [3] Dahiru Tukur, 2008, Ann Ib Postgrad Med, V6, P21
  • [4] Approximate statistical tests for comparing supervised classification learning algorithms
    Dietterich, TG
    [J]. NEURAL COMPUTATION, 1998, 10 (07) : 1895 - 1923
  • [5] Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
  • [6] Fedotenkova M., 2016, Ph.D. thesis
  • [7] Geron A., 2019, Hands-on Machine Learning with Scikit-Learn, Keras, and Tensorflow, Vsecond, DOI DOI 10.1201/9780367816377
  • [8] Gurdip Kaur A. R., 2020, 10 INT C COMM NETW S
  • [9] Han J, 2012, MOR KAUF D, P1
  • [10] Characterization of Tor Traffic using Time based Features
    Lashkari, Arash Habibi
    Gil, Gerard Draper
    Mamun, Mohammad Saiful Islam
    Ghorbani, Ali A.
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 253 - 262