Abstract
Current era is the age of digital technology with LTE running over it. Ranging from smaller to bigger tasks, every bit of information is being stored and channelized through Internet which becomes a huge reservoir of data. This information became a point of interest for digital users present in the backdoors of Internet, which we call as black hat hackers. These hackers have come up with their own network, where they can perform illegal activities without even being noticed in their network, usually called as darknet. Every unofficial work like drug dealings, ammunition supply, human trafficking, credit card detail sharing, etc., is done here. Traces of these activities are not present because of the inaccessible nature of darknet. The architecture of these Websites is totally different from the normal network we work on, and it is therefore not possible to access such Websites like Tor and Onion directly. Therefore, there is a prior need for the detection of traffic coming from the darknet. In this paper, different algorithms have been used which classifies the darknet traffic based on varied features. The algorithms that are being used are K-nearest neighbor (KNN), support vector machine (SVM), Naïve Bayes classifier (NB), and random forest (RF). Out of these algorithms, random forest performs the best with the accuracy of 98.7.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gayard L (2018) Darknet: geopolitics and uses. John Wiley & Sons, Hoboken, NJ, pp 158. ISBN 9781786302021
Wood J (2010) The darknet: a digital copyright revolution. Richmond J Law Technol 16(4):14; Overhead J, Miller C (2012) Dissecting the Android bouncer. Summerton
Mansfield-Devine S (2009) Darknet. Comput Fraud Secur 2009(12):4–6. https://doi.org/10.1016/S1361-3723(09)70150-2
Pradhan S (2020) Anonymous. In: The darkest web: the dark side of the internet. India. pp 9. ISBN 9798561755668
Martin J (2014) Drugs on the dark net: how cryptomarkets are transforming the global trade in illicit drugs. Palgrave Macmillan, New York, pp 2. ISBN 9781349485666
Bartlett J (2014) The dark net: inside the digital underworld. Random House
McCann B, Bradbury J, Xiong C, Socher R (2017) Learned in translation: contextualized word vectors. In: Proceeding of NeurIPS, pp 6297–6308
Graczyk M, Kinningham K (2015) Automatic product categorization for anonymous market places. Tech Rep Stanford Univer
Elahi T, Bauer K, AlSabah M, Dingledine R, Goldberg I (2012) Changing of the guards: a framework for understanding and improving entry guard selection in tor. In: Proceedings of the 2012 ACM workshop on privacy in the electronic society. ACM, pp 43–54
Yang Y, Yu H, Yang L, Yang M, Chen L, Zhu G, Wen L (2019) Hadoop-based dark web threat intelligence analysis framework. In: Proceedings of the 2019 IEEE 3rd advanced information management, communicates, electronic and automation control conference (IMCEC). Chongqing, China, pp 1088–1091
Sun X, Gui G, Li Y, Liu R, An Y (2018) ResInNet: a novel deep neural network with feature re-use for Internet of Things. IEEE Internet Things J 6
Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. Data Sci Artif Intell Commun 2019:76–81
Fachkha C, Bou-Harb E, Debbabi M (2015) Inferring distributed reflection denial of service attacks from darknet. Comput Commun 62(2015):59–71
Gadhia F, Choi J, Cho B, Song J (2015) Comparative analysis of darknet traffic characteristics between darknet sensors. In: International conference on advanced communication technology, pp 59–64
Pustokhina I, Pustokhin D, Gupta D, Khanna A, Shankar D, Nhu N (2020) An effective training scheme for deep neural network in edge computing enabled internet of medical things (IoMT) systems. IEEE Access 8
Sellappan D, Srinivasan R (2014) Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J Soft Comput 4:743–961
Lashkari AH, Kaur G, Rahali (2020) DIDrknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning. In: 10th international conference on communication and network security. Tokyo, Japan
Xiaio (2010) Principal component analysis for feature extraction of image sequence. In: Proceedings of international conference on computer and communication technologies in agriculture engineering
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mantoo, B.A., Bansal, H. (2023). Darkness Behind the Darknet: A Comparative Analysis of Darknet Traffic and the Crimes Behind the Darknet Using Machine Learning. In: Singh, Y., Singh, P.K., Kolekar, M.H., Kar, A.K., Gonçalves, P.J.S. (eds) Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_12
Download citation
DOI: https://doi.org/10.1007/978-981-19-9876-8_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9875-1
Online ISBN: 978-981-19-9876-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)