Skip to main content

28.02.2023 | Original Article

Darknet traffic analysis, and classification system based on modified stacking ensemble learning algorithms

verfasst von: Ammar Almomani

Erschienen in: Information Systems and e-Business Management

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Darknet, a source of cyber intelligence, refers to the internet’s unused address space, which people do not expect to interact with their computers. The establishment of security requires analyses of the threats characterizing the network. New machine learning classifiers known as stacking ensemble learning are proposed in this paper to analyze and classify darknet traffic. In dealing with darknet attack problems, this new system uses predictions formed by 3 base learning techniques. The system was tested on a dataset comprising more than 141,000 records analyzed from CIC-Darknet 2020. The experiment results demonstrated the study’s classifiers’ ability to distinguish between the malignant traffic and benign traffic easily. The classifiers can effectively detect known and unknown threats with high precision and accuracy greater than 99% in the training and 97% in the testing phases, with increments ranging from 4 to 64% by current algorithms. As a result, the proposed system becomes more robust and accurate as data grows. Also, the proposed system has the best standard deviation compared with current A.I. algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abu Al-Haija Q, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11(4):556CrossRef Abu Al-Haija Q, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11(4):556CrossRef
Zurück zum Zitat Ali SHA, Ozawa S, Ban T, Nakazato J, Shimamura J (2016) A neural network model for detecting DDoS attacks using darknet traffic features. In: 2016 International joint conference on neural networks (IJCNN). Ali SHA, Ozawa S, Ban T, Nakazato J, Shimamura J (2016) A neural network model for detecting DDoS attacks using darknet traffic features. In: 2016 International joint conference on neural networks (IJCNN).
Zurück zum Zitat Alieyan K, Anbar M, Almomani A, Abdullah R, Alauthman M (2018) Botnets detecting attack based on DNS features. In: 2018 International Arab conference on information technology (ACIT). Alieyan K, Anbar M, Almomani A, Abdullah R, Alauthman M (2018) Botnets detecting attack based on DNS features. In: 2018 International Arab conference on information technology (ACIT).
Zurück zum Zitat Al-Kasassbeh M, Mohammed S, Alauthman M, Almomani A (2020) Feature selection using a machine learning to classify a malware. In: Gupta BB, Perez GM, Agrawal DP, Gupta D (eds) Handbook of computer networks and cyber security. Springer, Berlin, pp 889–904CrossRef Al-Kasassbeh M, Mohammed S, Alauthman M, Almomani A (2020) Feature selection using a machine learning to classify a malware. In: Gupta BB, Perez GM, Agrawal DP, Gupta D (eds) Handbook of computer networks and cyber security. Springer, Berlin, pp 889–904CrossRef
Zurück zum Zitat Almomani A (2018) Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Comput Appl 29(7):483–493CrossRef Almomani A (2018) Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Comput Appl 29(7):483–493CrossRef
Zurück zum Zitat Almomani A (2022) Classification of virtual private networks encrypted traffic using ensemble learning algorithms. Egypt Inf J 23:57 Almomani A (2022) Classification of virtual private networks encrypted traffic using ensemble learning algorithms. Egypt Inf J 23:57
Zurück zum Zitat Almomani A, Gupta BB, Atawneh S, Meulenberg A, Almomani E (2013) A survey of phishing email filtering techniques. IEEE Commun Surv Tutor 15(4):2070–2090CrossRef Almomani A, Gupta BB, Atawneh S, Meulenberg A, Almomani E (2013) A survey of phishing email filtering techniques. IEEE Commun Surv Tutor 15(4):2070–2090CrossRef
Zurück zum Zitat Al-Nawasrah A, Al-Momani A, Meziane F, Alauthman M (2018) Fast flux botnet detection framework using adaptive dynamic evolving spiking neural network algorithm. In: 2018 9th international conference on information and communication systems (ICICS). Al-Nawasrah A, Al-Momani A, Meziane F, Alauthman M (2018) Fast flux botnet detection framework using adaptive dynamic evolving spiking neural network algorithm. In: 2018 9th international conference on information and communication systems (ICICS).
Zurück zum Zitat Ardabili S, Mosavi A, Várkonyi-Kóczy AR (2019) Advances in machine learning modeling reviewing hybrid and ensemble methods. In: International conference on global research and education. Ardabili S, Mosavi A, Várkonyi-Kóczy AR (2019) Advances in machine learning modeling reviewing hybrid and ensemble methods. In: International conference on global research and education.
Zurück zum Zitat Balkanli E, Zincir-Heywood AN, Heywood MI (2015) Feature selection for robust backscatter DDoS detection. In: 2015 IEEE 40th local computer networks conference workshops (LCN workshops). Balkanli E, Zincir-Heywood AN, Heywood MI (2015) Feature selection for robust backscatter DDoS detection. In: 2015 IEEE 40th local computer networks conference workshops (LCN workshops).
Zurück zum Zitat Ben-Hur A, Horn D, Siegelmann HT, Vapnik V (2001) Support vector clustering. J Mach Learn Res 2(12):125–137 Ben-Hur A, Horn D, Siegelmann HT, Vapnik V (2001) Support vector clustering. J Mach Learn Res 2(12):125–137
Zurück zum Zitat Bou-Harb E, Assi C, Debbabi M (2016) Csc-detector: a system to infer large-scale probing campaigns. IEEE Trans Dependable Secur Comput 15(3):364–377CrossRef Bou-Harb E, Assi C, Debbabi M (2016) Csc-detector: a system to infer large-scale probing campaigns. IEEE Trans Dependable Secur Comput 15(3):364–377CrossRef
Zurück zum Zitat Bou-Harb E, Husák M, Debbabi M, Assi C (2017) Big data sanitization and cyber situational awareness: a network telescope perspective. IEEE Trans Big Data 5:439CrossRef Bou-Harb E, Husák M, Debbabi M, Assi C (2017) Big data sanitization and cyber situational awareness: a network telescope perspective. IEEE Trans Big Data 5:439CrossRef
Zurück zum Zitat Cambiaso E, Vaccari I, Patti L, Aiello M (2019) Darknet security: a categorization of attacks to the tor network. In: ITASEC. Cambiaso E, Vaccari I, Patti L, Aiello M (2019) Darknet security: a categorization of attacks to the tor network. In: ITASEC.
Zurück zum Zitat Chui KT, Gupta BB, Vasant P (2021) A genetic algorithm optimized rnn-lstm model for remaining useful life prediction of turbofan engine. Electronics 10(3):285CrossRef Chui KT, Gupta BB, Vasant P (2021) A genetic algorithm optimized rnn-lstm model for remaining useful life prediction of turbofan engine. Electronics 10(3):285CrossRef
Zurück zum Zitat Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297CrossRef Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297CrossRef
Zurück zum Zitat Cvitić I, Peraković D, Gupta B, Choo K-KR (2021) Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J 9:2109 CrossRef Cvitić I, Peraković D, Gupta B, Choo K-KR (2021) Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J 9:2109 CrossRef
Zurück zum Zitat Dainotti A, King A, Claffy K, Papale F, Pescapé A (2014) Analysis of a “/0” stealth scan from a botnet. IEEE/ACM Trans Networking 23(2):341–354CrossRef Dainotti A, King A, Claffy K, Papale F, Pescapé A (2014) Analysis of a “/0” stealth scan from a botnet. IEEE/ACM Trans Networking 23(2):341–354CrossRef
Zurück zum Zitat Demertzis K, Tsiknas K, Takezis D, Skianis C, Iliadis LJE (2021) Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks framework. Electronics 10(7):781 CrossRef Demertzis K, Tsiknas K, Takezis D, Skianis C, Iliadis LJE (2021) Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks framework. Electronics 10(7):781 CrossRef
Zurück zum Zitat Dietterich TG (2000) Ensemble methods in machine learning. In: International workshop on multiple classifier systems. Dietterich TG (2000) Ensemble methods in machine learning. In: International workshop on multiple classifier systems.
Zurück zum Zitat Divina F, Gilson A, Goméz-Vela F, García Torres M, Torres JF (2018) Stacking ensemble learning for short-term electricity consumption forecasting. Energies 11(4):949CrossRef Divina F, Gilson A, Goméz-Vela F, García Torres M, Torres JF (2018) Stacking ensemble learning for short-term electricity consumption forecasting. Energies 11(4):949CrossRef
Zurück zum Zitat Du P, Xia J, Zhang W, Tan K, Liu Y, Liu S (2012) Multiple classifier system for remote sensing image classification: a review. Sensors 12(4):4764–4792CrossRef Du P, Xia J, Zhang W, Tan K, Liu Y, Liu S (2012) Multiple classifier system for remote sensing image classification: a review. Sensors 12(4):4764–4792CrossRef
Zurück zum Zitat Furutani N, Ban T, Nakazato J, Shimamura J, Kitazono J, Ozawa S (2014) Detection of DDoS backscatter based on traffic features of darknet TCP packets. In: 2014 Ninth Asia Joint conference on information security. Furutani N, Ban T, Nakazato J, Shimamura J, Kitazono J, Ozawa S (2014) Detection of DDoS backscatter based on traffic features of darknet TCP packets. In: 2014 Ninth Asia Joint conference on information security.
Zurück zum Zitat Habibi Lashkari A, Kaur G, Rahali A (2020) DIDarknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning. In: 2020 the 10th international conference on communication and network security. Habibi Lashkari A, Kaur G, Rahali A (2020) DIDarknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning. In: 2020 the 10th international conference on communication and network security.
Zurück zum Zitat Hansen LK, Salamon P (1990) Neural network ensembles. IEEE Trans Pattern Anal Mach Intell 12(10):993–1001CrossRef Hansen LK, Salamon P (1990) Neural network ensembles. IEEE Trans Pattern Anal Mach Intell 12(10):993–1001CrossRef
Zurück zum Zitat Hopfield JJ (1988) Artificial neural networks. IEEE Circuits Devices Mag 4(5):3–10CrossRef Hopfield JJ (1988) Artificial neural networks. IEEE Circuits Devices Mag 4(5):3–10CrossRef
Zurück zum Zitat Hu Y, Zou F, Li L, Yi P (2020) Traffic classification of user behaviors in tor, i2p, zeronet, freenet. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). Hu Y, Zou F, Li L, Yi P (2020) Traffic classification of user behaviors in tor, i2p, zeronet, freenet. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom).
Zurück zum Zitat Iliadis LA, Kaifas T (2021) Darknet traffic classification using machine learning techniques. In: 2021 10th international conference on modern circuits and systems technologies (MOCAST). Iliadis LA, Kaifas T (2021) Darknet traffic classification using machine learning techniques. In: 2021 10th international conference on modern circuits and systems technologies (MOCAST).
Zurück zum Zitat Kumar S, Vranken H, van Dijk J, Hamalainen T (2019) Deep in the dark: a novel threat detection system using darknet traffic. In: 2019 IEEE International conference on big data (big data). Kumar S, Vranken H, van Dijk J, Hamalainen T (2019) Deep in the dark: a novel threat detection system using darknet traffic. In: 2019 IEEE International conference on big data (big data).
Zurück zum Zitat Lagraa S, François J (2017) Knowledge discovery of port scans from darknet. In: 2017 IFIP/IEEE symposium on integrated network and service management (IM). Lagraa S, François J (2017) Knowledge discovery of port scans from darknet. In: 2017 IFIP/IEEE symposium on integrated network and service management (IM).
Zurück zum Zitat Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: ICISSp Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: ICISSp
Zurück zum Zitat Mishra A, Gupta N, Gupta B (2021) Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun Syst 77(1):47–62CrossRef Mishra A, Gupta N, Gupta B (2021) Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun Syst 77(1):47–62CrossRef
Zurück zum Zitat Niranjana R, Kumar VA, Sheen S (2020) Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm. SN Comput Sci 1(1):16CrossRef Niranjana R, Kumar VA, Sheen S (2020) Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm. SN Comput Sci 1(1):16CrossRef
Zurück zum Zitat Ozawa S, Ban T, Hashimoto N, Nakazato J, Shimamura J (2020) A study of IoT malware activities using association rule learning for darknet sensor data. Int J Inf Secur 19(1):83–92CrossRef Ozawa S, Ban T, Hashimoto N, Nakazato J, Shimamura J (2020) A study of IoT malware activities using association rule learning for darknet sensor data. Int J Inf Secur 19(1):83–92CrossRef
Zurück zum Zitat Pang R, Yegneswaran V, Barford P, Paxson V, Peterson L (2004) Characteristics of internet background radiation. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. Pang R, Yegneswaran V, Barford P, Paxson V, Peterson L (2004) Characteristics of internet background radiation. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement.
Zurück zum Zitat Perrone MP, Cooper LN (1992) When networks disagree: Ensemble methods for hybrid neural networks. World scientific, Hackensack Perrone MP, Cooper LN (1992) When networks disagree: Ensemble methods for hybrid neural networks. World scientific, Hackensack
Zurück zum Zitat Ponti Jr MP (2011) Combining classifiers: from the creation of ensembles to the decision fusion. In: 2011 24th SIBGRAPI conference on graphics, patterns, and images tutorials. Ponti Jr MP (2011) Combining classifiers: from the creation of ensembles to the decision fusion. In: 2011 24th SIBGRAPI conference on graphics, patterns, and images tutorials.
Zurück zum Zitat Rajawat AS, Bedi P, Goyal S, Kautish S, Xihua Z, Aljuaid H, Mohamed AW (2022) Dark web data classification using neural network. Comput Intell Neurosci 2022:1–11CrossRef Rajawat AS, Bedi P, Goyal S, Kautish S, Xihua Z, Aljuaid H, Mohamed AW (2022) Dark web data classification using neural network. Comput Intell Neurosci 2022:1–11CrossRef
Zurück zum Zitat Rey D, Neuhäuser M (2011) Wilcoxon-signed-rank test. In: Lovric M (ed) International encyclopedia of statistical science. Springer, Berlin, pp 1658–1659 CrossRef Rey D, Neuhäuser M (2011) Wilcoxon-signed-rank test. In: Lovric M (ed) International encyclopedia of statistical science. Springer, Berlin, pp 1658–1659 CrossRef
Zurück zum Zitat Sahoo SR, Gupta BB (2021) Multiple features based approach for automatic fake news detection on social networks using deep learning. Appl Soft Comput 100:106983CrossRef Sahoo SR, Gupta BB (2021) Multiple features based approach for automatic fake news detection on social networks using deep learning. Appl Soft Comput 100:106983CrossRef
Zurück zum Zitat Sarkar D, Vinod P, Yerima SY (2020) Detection of Tor traffic using deep learning. In: 2020 IEEE/ACS 17th international conference on computer systems and applications (AICCSA). Sarkar D, Vinod P, Yerima SY (2020) Detection of Tor traffic using deep learning. In: 2020 IEEE/ACS 17th international conference on computer systems and applications (AICCSA).
Zurück zum Zitat Sarwar MB, Hanif MK, Talib R, Younas M, Sarwar MU (2021a) DarkDetect: Darknet traffic detection and categorization using modified convolution-long short-term memory. IEEE Access 9:113705–113713CrossRef Sarwar MB, Hanif MK, Talib R, Younas M, Sarwar MU (2021a) DarkDetect: Darknet traffic detection and categorization using modified convolution-long short-term memory. IEEE Access 9:113705–113713CrossRef
Zurück zum Zitat Sinnott R, Duan H, Sun Y (2016) Chapter 15-a case study in big data analytics: exploring twitter sentiment analysis and the weather. Big Data, 357–388 Sinnott R, Duan H, Sun Y (2016) Chapter 15-a case study in big data analytics: exploring twitter sentiment analysis and the weather. Big Data, 357–388
Zurück zum Zitat Škrjanc I, Ozawa S, Dovžan D, Tao B, Nakazato J, Shimamura J (2017) Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring. In: 2017 IEEE symposium series on computational intelligence (SSCI). Škrjanc I, Ozawa S, Dovžan D, Tao B, Nakazato J, Shimamura J (2017) Evolving cauchy possibilistic clustering and its application to large-scale cyberattack monitoring. In: 2017 IEEE symposium series on computational intelligence (SSCI).
Zurück zum Zitat Tolles J, Meurer WJ (2016) Logistic regression: relating patient characteristics to outcomes. JAMA 316(5):533–534CrossRef Tolles J, Meurer WJ (2016) Logistic regression: relating patient characteristics to outcomes. JAMA 316(5):533–534CrossRef
Zurück zum Zitat Walker SH, Duncan DB (1967) Estimation of the probability of an event as a function of several independent variables. Biometrika 54(1–2):167–179CrossRef Walker SH, Duncan DB (1967) Estimation of the probability of an event as a function of several independent variables. Biometrika 54(1–2):167–179CrossRef
Zurück zum Zitat Wang Q, Chen Z, Chen C (2011) Darknet-based inference of internet worm temporal characteristics. IEEE Trans Inf Forensics Secur 6(4):1382–1393CrossRef Wang Q, Chen Z, Chen C (2011) Darknet-based inference of internet worm temporal characteristics. IEEE Trans Inf Forensics Secur 6(4):1382–1393CrossRef
Zurück zum Zitat Woźniak M, Grana M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3–17CrossRef Woźniak M, Grana M, Corchado E (2014) A survey of multiple classifier systems as hybrid systems. Inf Fusion 16:3–17CrossRef
Zurück zum Zitat Young S, Abdou T, Bener A (2018) Deep super learner: a deep ensemble for classification problems. In: Canadian conference on artificial intelligence. Young S, Abdou T, Bener A (2018) Deep super learner: a deep ensemble for classification problems. In: Canadian conference on artificial intelligence.
Zurück zum Zitat Zhang R, Yang C, Pang S, Sarrafzadeh H (2017) Unitecdeamp: flow feature profiling for malicious events identification in darknet space. In: International conference on applications and techniques in information security. Zhang R, Yang C, Pang S, Sarrafzadeh H (2017) Unitecdeamp: flow feature profiling for malicious events identification in darknet space. In: International conference on applications and techniques in information security.
Zurück zum Zitat Zhou Z-H (2019) Ensemble methods: foundations and algorithms. Chapman and Hall/CRC, Boca Raton Zhou Z-H (2019) Ensemble methods: foundations and algorithms. Chapman and Hall/CRC, Boca Raton
Metadaten
Titel
Darknet traffic analysis, and classification system based on modified stacking ensemble learning algorithms
verfasst von
Ammar Almomani
Publikationsdatum
28.02.2023
Verlag
Springer Berlin Heidelberg
Erschienen in
Information Systems and e-Business Management
Print ISSN: 1617-9846
Elektronische ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-023-00626-2