Skip to main content

Darkness Behind the Darknet: A Comparative Analysis of Darknet Traffic and the Crimes Behind the Darknet Using Machine Learning

  • Conference paper
  • First Online:
Proceedings of International Conference on Recent Innovations in Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1001))

  • 372 Accesses

Abstract

Current era is the age of digital technology with LTE running over it. Ranging from smaller to bigger tasks, every bit of information is being stored and channelized through Internet which becomes a huge reservoir of data. This information became a point of interest for digital users present in the backdoors of Internet, which we call as black hat hackers. These hackers have come up with their own network, where they can perform illegal activities without even being noticed in their network, usually called as darknet. Every unofficial work like drug dealings, ammunition supply, human trafficking, credit card detail sharing, etc., is done here. Traces of these activities are not present because of the inaccessible nature of darknet. The architecture of these Websites is totally different from the normal network we work on, and it is therefore not possible to access such Websites like Tor and Onion directly. Therefore, there is a prior need for the detection of traffic coming from the darknet. In this paper, different algorithms have been used which classifies the darknet traffic based on varied features. The algorithms that are being used are K-nearest neighbor (KNN), support vector machine (SVM), Naïve Bayes classifier (NB), and random forest (RF). Out of these algorithms, random forest performs the best with the accuracy of 98.7.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gayard L (2018) Darknet: geopolitics and uses. John Wiley & Sons, Hoboken, NJ, pp 158. ISBN 9781786302021

    Google Scholar 

  2. Wood J (2010) The darknet: a digital copyright revolution. Richmond J Law Technol 16(4):14; Overhead J, Miller C (2012) Dissecting the Android bouncer. Summerton

    Google Scholar 

  3. Mansfield-Devine S (2009) Darknet. Comput Fraud Secur 2009(12):4–6. https://doi.org/10.1016/S1361-3723(09)70150-2

    Article  Google Scholar 

  4. Pradhan S (2020) Anonymous. In: The darkest web: the dark side of the internet. India. pp 9. ISBN 9798561755668

    Google Scholar 

  5. Martin J (2014) Drugs on the dark net: how cryptomarkets are transforming the global trade in illicit drugs. Palgrave Macmillan, New York, pp 2. ISBN 9781349485666

    Google Scholar 

  6. Bartlett J (2014) The dark net: inside the digital underworld. Random House

    Google Scholar 

  7. McCann B, Bradbury J, Xiong C, Socher R (2017) Learned in translation: contextualized word vectors. In: Proceeding of NeurIPS, pp 6297–6308

    Google Scholar 

  8. Graczyk M, Kinningham K (2015) Automatic product categorization for anonymous market places. Tech Rep Stanford Univer

    Google Scholar 

  9. Elahi T, Bauer K, AlSabah M, Dingledine R, Goldberg I (2012) Changing of the guards: a framework for understanding and improving entry guard selection in tor. In: Proceedings of the 2012 ACM workshop on privacy in the electronic society. ACM, pp 43–54

    Google Scholar 

  10. Yang Y, Yu H, Yang L, Yang M, Chen L, Zhu G, Wen L (2019) Hadoop-based dark web threat intelligence analysis framework. In: Proceedings of the 2019 IEEE 3rd advanced information management, communicates, electronic and automation control conference (IMCEC). Chongqing, China, pp 1088–1091

    Google Scholar 

  11. Sun X, Gui G, Li Y, Liu R, An Y (2018) ResInNet: a novel deep neural network with feature re-use for Internet of Things. IEEE Internet Things J 6

    Google Scholar 

  12. Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. Data Sci Artif Intell Commun 2019:76–81

    Google Scholar 

  13. Fachkha C, Bou-Harb E, Debbabi M (2015) Inferring distributed reflection denial of service attacks from darknet. Comput Commun 62(2015):59–71

    Article  Google Scholar 

  14. Gadhia F, Choi J, Cho B, Song J (2015) Comparative analysis of darknet traffic characteristics between darknet sensors. In: International conference on advanced communication technology, pp 59–64

    Google Scholar 

  15. Pustokhina I, Pustokhin D, Gupta D, Khanna A, Shankar D, Nhu N (2020) An effective training scheme for deep neural network in edge computing enabled internet of medical things (IoMT) systems. IEEE Access 8

    Google Scholar 

  16. Sellappan D, Srinivasan R (2014) Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J Soft Comput 4:743–961

    Article  Google Scholar 

  17. Lashkari AH, Kaur G, Rahali (2020) DIDrknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning. In: 10th international conference on communication and network security. Tokyo, Japan

    Google Scholar 

  18. Xiaio (2010) Principal component analysis for feature extraction of image sequence. In: Proceedings of international conference on computer and communication technologies in agriculture engineering

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bilal Ahmad Mantoo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mantoo, B.A., Bansal, H. (2023). Darkness Behind the Darknet: A Comparative Analysis of Darknet Traffic and the Crimes Behind the Darknet Using Machine Learning. In: Singh, Y., Singh, P.K., Kolekar, M.H., Kar, A.K., Gonçalves, P.J.S. (eds) Proceedings of International Conference on Recent Innovations in Computing. Lecture Notes in Electrical Engineering, vol 1001. Springer, Singapore. https://doi.org/10.1007/978-981-19-9876-8_12

Download citation

Publish with us

Policies and ethics