An optimization-based approach to identifying and detecting malicious activity in the dark web
DOI:
https://doi.org/10.29304/jqcsm.2024.16.41779Keywords:
optimization, identification, classification, machine learning, network analysis, cybersecurity, network threatsAbstract
Dark web emerged as an encrypted and closed network that can only be accessed by computers using specific software and allows users to apply for membership and you have to provide your IDs to the admin of that network, which creates severe challenges in passing cybersecurity; With advanced Internet facilities, the origin and possibility of network invasions or attacks are increasing, and it is becoming very difficult for traditional anomaly detection systems to analyze objectively and pass Functional Purpose: Our ultimate goal by applying machine learning algorithms and network analysis methods is to identify a certain set of attributes that May indicate a cyber threat. Like many other studies, the traffic in the current paper has also been generalized to represent darknet traffic with a classification of unique features between attacks and attacks. As is known, based on the results of the experimental analysis of the proposed approach, it is possible to conclude about the high efficiency of the developed method in identifying types of cyber threats . This project contributes, by utilizing and improving machine learning techniques, to finding reliable measures to mitigate threats in cyberspace, and improving threat detection programs.
Downloads
References
Ansh, S., & Singh, S. (2022, September). Analyze Dark Web and Security Threats. In International Conference on Innovations in Computer Science and Engineering (pp. 581-595). Singapore: Springer Nature Singapore.
Swartout, K. M., de Heer, B. A., Thompson, M. P., Zinzow, H. M., & Brennan, C. L. (2022). A cross-disciplinary review of empirical studies addressing repeat versus time-limited sexual violence perpetration. Engaging Boys and Men in Sexual Assault Prevention, 411-422.
Ali, M. I., & Kaur, S. (2021, February). The Impact of India’s Cyber Security Law and Cyber Forensic On Building Techno-Centric Smartcity IoT Environment. In 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (pp. 751-759). IEEE.
Durga, S., Nag, R., & Daniel, E. (2019, March). Survey on machine learning and deep learning algorithms used in internet of things (IoT) healthcare. In 2019 3rd international conference on computing methodologies and communication (ICCMC) (pp. 1018-1022). IEEE.
Berman, D. S., Buczak, A. L., Chavis, J. S., & Corbett, C. L. (2019). A survey of deep learning methods for cyber security. Information, 10(4), 122.
Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. Open Source Intelligence and Cyber Crime: Social Media Analytics, 89-111.
Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A depiction and classification of the stolen data market ecosystem and comprising darknet markets: a multidisciplinary approach. Journal of Contemporary Criminal Justice, 39(2), 298-317.
Brewer, R., Westlake, B., Hart, T., & Arauza, O. (2021). The ethics of web crawling and web scraping in cybercrime research: Navigating issues of consent, privacy, and other potential harms associated with automated data collection. Researching cybercrimes: methodologies, ethics, and critical approaches, 435-456.
Arunkumar, M., & Kumar, K. A. (2023). GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment. International Journal of Information Technology, 15(3), 1653-1660.
Mienye, I. D., & Sun, Y. (2022). A survey of ensemble learning: Concepts, algorithms, applications, and prospects. IEEE Access, 10, 99129-99149.
Miranda-Vega, J. E., Rivas-López, M., & Fuentes, W. F. (2020). K-nearest neighbor classification for pattern recognition of a reference source light for machine vision system. IEEE sensors journal, 21(10), 11514-11521.
Bianchi, F. M., Maiorino, E., Kampffmeyer, M. C., Rizzi, A., & Jenssen, R. (2017). Recurrent neural networks for short-term load forecasting: an overview and comparative analysis.
Staudemeyer, R. C., & Morris, E. R. (2019). Understanding LSTM--a tutorial into long short-term memory recurrent neural networks. arXiv preprint arXiv:1909.09586.
Rodriguez, E., Otero, B., Gutierrez, N., & Canal, R. (2021). A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Communications Surveys & Tutorials, 23(3), 1920-1955.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Arif Hasan Abd Ali
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.