Home » Tag Archives: traffic

Tag Archives: traffic

Research: Using the Hidden Markov Model to identify Meek based Tor network traffic

Tor is by far the most widely used internet censorship circumvention solution. The Tor browser relies on a unique obfuscation technology known as “Meek” to promote users’ privacy. Meek obfuscates Tor network traffic so that it seems like ordinary forms of internet traffic. However, hidden Markov models can be used to identify Tor network traffic. A recently published research paper ... Read More »

Stochastic.PNG

Research: Using stochastic geometry to analyze network traffic and exclude heterogeneous (malicious) darknet traffic

Throughout the past few years, the explosive advancement of receivers and the rapid surge of data traffic have greatly impacted the current network architecture. According to data presented by the Cisco Complete VNI in 2017, the monthly internet traffic per receiver will rise to around 43 GB by the year 2021. As such, in order to attain optimum network management ... Read More »

Tor exit node (1).PNG

Research: Analyzing the DNS traffic of a high bandwidth Tor exit node – A research study

Internet usage differs markedly from one country to another when accessed websites are considered, especially in countries where censorship is exercised. People all over the world usually use Tor to communicate anonymously over the internet. The institute of networks and security (INS) hosts an exit node, with high bandwidth (200 MBit/s), on the Tor network for research purposes. A recently ... Read More »

darknet SYN packets.PNG

Research: Using association rule learning with darknet traffic analysis to identify IoT malware

During the past few years, the rapid advancement of the Internet of Things (IoT) technologies has introduced transformational changes to our life. Nevertheless, the sophistication of IoT systems comes at the expense of a rise in the severity of cyberattacks that exploit vulnerabilities in IoT devices. In particular, the aftermath of a recently discovered IoT malware, known as Mirai, was ... Read More »

Tor malware.jpg

A new method for detecting malicious traffic over the Tor network

Tor is a unique overlay network that was developed to provide anonymous online communications for TCP based applications. The Tor network is currently serving hundreds of thousands of users, helping them to conceal their identity while surfing the internet. Even though the Tor network is currently mainly used to bypass internet censorship in countries governed by oppressive regimes, the anonymity ... Read More »

Tor traffic 1.jpg

Studying Tor Network Traffic Using Hidden Markov Modeling and Dynamic Learning by Tamer Sameeh

Experimentation techniques aid in the testing of Tor’s performance and discovery of security problems, as well as allowing researchers to privately and safely conduct Tor experiments without imposing harm on live Tor users. Nevertheless, researchers using these techniques configure them in such a way to generate network traffic on the basis of simplifying assumptions as well as invalid measurements and ... Read More »

Tor (the myth and reality.PNG

Reconstructing Tor Circuits Using Compartment Adversaries and Monitoring of Cross-border Traffic

The Onion Routing (Tor) protocol represents a well established network routing system that is designed to provide users with low latency communication channels, that cannot be attacked by network level adversaries attempting to identify who is communicating with whom. It is clearly understood how the Tor network behaves whenever an adversary compromises a percentage of the onion routers, and especially ... Read More »

Agents in Kazakhstan Trained to Combat Dark Web Drug Traffic

Law enforcers in Kazakhstan were recently trained on how to counter and manage online dark web drug trafficking. The training targeted employees for domestic law enforcement agencies in the country’s capital of Astana. It involved 15 agents and they were taught in order to teach and train other agents. Also in attendance were representatives of the Ministry of Internal Affairs ... Read More »

Detection of Malicious or Black IP Addresses Via Analysis of Daily Darknet Traffic

The world has recently began to recognize the significance and dangerous impact of various forms of network vulnerabilities. Moreover, cybercriminals can exploit these vulnerabilities to phish sensitive and private information from the machines of vulnerable web users. As such, researchers have recently began to thoroughly study how countermeasures can be created to solve various network vulnerability issues. A recently published ... Read More »

UnitecDEAMP -A Novel Darknet Traffic Decomposition Approach

Malware is increasingly becoming major threats that almost always finds a way to penetrate through a network, undermining the integrity, confidentiality and availability of data. Network forensics represent the utilization of scientifically proven strategies to identify, obtain, fuse, examine and analyze digital evidence of pre planned intent, or monitored success of malicious activities meant to corrupt, disrupt and/or compromise various ... Read More »

Tor anonymizers.jpg

ROUTING ALL TRAFFIC THROUGH TOR: PRO AND CONS

Every reader of DeepDotWeb knows the importance of surfing the web protected by the Tor network and therefore uses a Tor Browser Bundle. The TBB not only helps us connecting through the Tor network while surfing the internet allowing us to visit onion sites and hiding our ip, but it also uses many security built-in plugins to increase our anonymity ... Read More »

Tor anonymizers.jpg

Frankfurt: 50% of German Dark web Traffic is Illegal

On May 8, 2017, the Frankfurt public prosecutor spoke about the darknet and raised more questions regarding law enforcement’s job in policing hidden services. He acknowledged that the line between crime and free speech was undeniably difficult to distinguish. While allowing almost-unrestricted Tor access could save police resources and protect journalists, it might allow crime levels to go unchecked, he ... Read More »