A SURVEY ON DEEP LEARNING TECHNIQUES FOR DARKNET TRAFFIC MALWARE DETECTION

نویسندگان

چکیده

Encrypted data that is sent over Tor or a VPN referred to as "darknet traffic." In order identify network activity brought on by cyberattack, it crucial be able recognise, find, and explain darknet activities. Cyberattacks pose serious danger security management can effectively observed through monitoring classification. Despite the fact many surveys were conducted traffic classification using machine learning techniques, only small number of researchers have means review their work classifying deep techniques. this article, we introduce novel idea for research malware used in uses Deep Learning which will aid improving surveys. First, based survey, chose few including Neural Network (DNN), Convolution (CNN), Recurrent (RNN), AutoEncoder (AE) proven more effective recent study. Second, dataset CIC-DarkNet-2020, contains variety activities TOR traffic, develop models. Finally, after analysing information, discovered best Model Darknet has potential enhance efficiency variant detection constrained system resources. Index Terms – Darknet, DNN, CNN, RNN, AE, Learning, Classifying Darknet.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malware Detection and Evasion with Machine Learning Techniques: A Survey

Malware has become a powerful and sophisticated tool used by malicious users to compromise and harm systems, and its evasion ability has improved considerably, getting to the point of becoming completely undetectable. On the other hand, machine learning has evolved tremendously in last years and it has become a standard in many IT solutions including the data processing field. Likewise, cryptog...

متن کامل

A Wide Scale Survey on Clustering Techniques for Malware Detection

Use of internet has enhanced the problem of malwares. At the same time the advancement in technology has given rise to evolution of portable mobile devices. It has become the danger point of day today activities like mails, mobile banking etc. Our purpose is to trace various clustering techniques for malware detection.

متن کامل

A Survey on Various Malware Detection Techniques on Mobile Platform

With the rapid arrival of mobile platforms on the market, android Platform has become a market leader in 2015 Q2, according to IDC. As Android has ruling most of the market, the problem of malware threats and security is also increasing. In this review paper, a fastidious study of the terms related to mobile malware and the techniques used for the detection of malware is done. Some proposed met...

متن کامل

A Survey on Techniques in Detection and Analyzing Malware Executables

The computer technology has emerged as a necessity in our day to day life to deal with various aspects like education, banking, communication, entertainment etc. Computer system’s security is threatened by weapons named as malware to accomplish malicious intention of its writers. Various solutions are available to detect these threats like AV Scanners, Intrusion Detection System, and Firewalls ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management

سال: 2023

ISSN: ['2582-3930']

DOI: https://doi.org/10.55041/ijsrem24715