{"id":"https://openalex.org/W4383750638","doi":"https://doi.org/10.1109/access.2023.3293526","title":"Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification","display_name":"Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4383750638","doi":"https://doi.org/10.1109/access.2023.3293526"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3293526","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3293526","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10177161.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10177161.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013674024","display_name":"Ishan Karunanayake","orcid":"https://orcid.org/0000-0002-5349-4943"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ishan Karunanayake","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","Cyber Security Cooperative Research Centre, Joondalup, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Joondalup, WA, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080202547","display_name":"Nadeem Ahmed","orcid":"https://orcid.org/0000-0001-8169-040X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nadeem Ahmed","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","Cyber Security Cooperative Research Centre, Joondalup, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Joondalup, WA, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024845170","display_name":"Robert Malaney","orcid":"https://orcid.org/0000-0001-9672-5601"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Robert Malaney","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","Cyber Security Cooperative Research Centre, Joondalup, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Joondalup, WA, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065820146","display_name":"Rafiqul Islam","orcid":"https://orcid.org/0000-0001-8317-5727"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rafiqul Islam","raw_affiliation_strings":["School of Computing and Mathematics, Charles Sturt University, Albury, NSW, Australia","Cyber Security Cooperative Research Centre, Joondalup, WA, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematics, Charles Sturt University, Albury, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Joondalup, WA, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015261020","display_name":"Sanjay Jha","orcid":"https://orcid.org/0000-0002-1844-1520"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sanjay K. Jha","raw_affiliation_strings":["Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","Cyber Security Cooperative Research Centre, Joondalup, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre, Joondalup, WA, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013674024"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.9136,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88561522,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"70011","last_page":"70022"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8701429963111877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6872158646583557},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5705680847167969},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5562637448310852},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5547592639923096},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5220988988876343},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4277067184448242},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.4127028286457062},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3833238482475281},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09716442227363586},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06886208057403564}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8701429963111877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6872158646583557},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5705680847167969},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5562637448310852},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5547592639923096},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5220988988876343},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4277067184448242},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.4127028286457062},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3833238482475281},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09716442227363586},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06886208057403564},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2023.3293526","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3293526","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10177161.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/56644be2-587d-4c20-aefb-c74e19869ac0","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/56644be2-587d-4c20-aefb-c74e19869ac0","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Karunanayake, I, Ahmed, N, Malaney, R, Islam, R & Jha, S K 2023, 'Darknet traffic analysis : Investigating the impact of modified tor traffic on onion service traffic classification', IEEE Access, vol. 11, pp. 70011-70022. https://doi.org/10.1109/ACCESS.2023.3293526","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:5da5eff144884142bf7e7a6343f12e85","is_oa":true,"landing_page_url":"https://doaj.org/article/5da5eff144884142bf7e7a6343f12e85","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 70011-70022 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3293526","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3293526","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10177161.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4383750638.pdf","grobid_xml":"https://content.openalex.org/works/W4383750638.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1570448133","https://openalex.org/W1590765731","https://openalex.org/W1655958391","https://openalex.org/W1992562179","https://openalex.org/W2099215689","https://openalex.org/W2149620660","https://openalex.org/W2278335717","https://openalex.org/W2485000773","https://openalex.org/W2591712613","https://openalex.org/W2751069419","https://openalex.org/W2752949934","https://openalex.org/W2790832484","https://openalex.org/W2904326537","https://openalex.org/W2963704216","https://openalex.org/W3106813043","https://openalex.org/W3127564873","https://openalex.org/W4240685602","https://openalex.org/W4294065829","https://openalex.org/W6635311569","https://openalex.org/W6681822384","https://openalex.org/W6693724512","https://openalex.org/W6695009093","https://openalex.org/W6743453213","https://openalex.org/W6744119509"],"related_works":["https://openalex.org/W2834885115","https://openalex.org/W2119752897","https://openalex.org/W2523443373","https://openalex.org/W2117874351","https://openalex.org/W1545371006","https://openalex.org/W3171671300","https://openalex.org/W4293088549","https://openalex.org/W2161963552","https://openalex.org/W2964663688","https://openalex.org/W2128735745"],"abstract_inverted_index":{"Classifying":[0],"network":[1],"traffic":[2,6,101,115,131,168],"is":[3,48,63],"important":[4],"for":[5,192],"shaping":[7],"and":[8,37,68,196],"monitoring.":[9],"In":[10,137,181],"the":[11,16,21,83,129,154,165,174,187],"last":[12],"two":[13],"decades,":[14],"with":[15,60,116],"emergence":[17],"of":[18,23,85],"privacy":[19],"concerns,":[20],"importance":[22],"privacy-preserving":[24],"technologies":[25],"has":[26],"risen.":[27],"The":[28,106],"Tor":[29,104,130,155],"network,":[30],"which":[31],"provides":[32],"anonymity":[33,58],"to":[34,52,72,81,97,128,132,153],"its":[35,134],"users":[36],"supports":[38],"anonymous":[39],"services":[40],"known":[41],"as":[42],"<italic":[43],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[44],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Onion":[45],"Services</i>":[46],",":[47],"a":[49],"popular":[50],"way":[51],"achieve":[53],"online":[54],"anonymity.":[55],"However,":[56,119],"this":[57,77],"(especially":[59],"Onion":[61,86,99,113,166],"Services)":[62],"frequently":[64],"misused,":[65],"encouraging":[66],"governments":[67],"law":[69],"enforcement":[70],"agencies":[71],"de-anonymise":[73],"them.":[74],"Therefore,":[75],"in":[76],"paper,":[78],"we":[79,95,108,141,185],"try":[80,96],"identify":[82,98,112,186],"classifiability":[84],"Service":[87,100,114,167],"traffic,":[88],"focusing":[89],"on":[90],"three":[91],"main":[92],"contributions.":[93],"First,":[94],"from":[102],"other":[103],"traffic.":[105,156],"techniques":[107,145],"have":[109,150],"used":[110],"can":[111,125],">99%":[117],"accuracy.":[118],"there":[120],"are":[121],"several":[122],"modifications":[123,149],"that":[124,161],"be":[126],"done":[127,152],"obfuscate":[133],"information":[135],"leakage.":[136],"our":[138,144,182,193],"second":[139],"contribution,":[140,184],"evaluate":[142,197],"how":[143],"perform":[146],"when":[147],"such":[148],"been":[151],"Our":[157],"experimental":[158],"results":[159],"show":[160],"these":[162],"conditions":[163],"make":[164],"less":[169],"distinguishable":[170],"(in":[171],"some":[172],"cases,":[173],"accuracy":[175],"drops":[176],"by":[177],"more":[178],"than":[179],"15%.)":[180],"final":[183],"most":[188],"influential":[189],"feature":[190],"combinations":[191],"classification":[194],"problem":[195],"their":[198],"impact.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
