{"id":"https://openalex.org/W1983831858","doi":"https://doi.org/10.1109/iwcmc.2014.6906329","title":"Towards a taxonomy of darknet traffic","display_name":"Towards a taxonomy of darknet traffic","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W1983831858","doi":"https://doi.org/10.1109/iwcmc.2014.6906329","mag":"1983831858"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2014.6906329","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014613205","display_name":"J\u00f9n L\u00edu","orcid":"https://orcid.org/0000-0002-7335-5860"},"institutions":[{"id":"https://openalex.org/I200475212","display_name":"The Graduate University for Advanced Studies, SOKENDAI","ror":"https://ror.org/0516ah480","country_code":"JP","type":"education","lineage":["https://openalex.org/I200475212"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Jun Liu","raw_affiliation_strings":["Department of Informatics, Graduate University for Advanced Studies","Department of Informatics, The Graduate University for Advanced Studies, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Graduate University for Advanced Studies","institution_ids":["https://openalex.org/I200475212"]},{"raw_affiliation_string":"Department of Informatics, The Graduate University for Advanced Studies, Japan","institution_ids":["https://openalex.org/I200475212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101814201","display_name":"Kensuke Fukuda","orcid":"https://orcid.org/0000-0001-8372-2807"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]},{"id":"https://openalex.org/I200475212","display_name":"The Graduate University for Advanced Studies, SOKENDAI","ror":"https://ror.org/0516ah480","country_code":"JP","type":"education","lineage":["https://openalex.org/I200475212"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kensuke Fukuda","raw_affiliation_strings":["National Institute of Informatics, Graduate University for Advanced Studies","National Institute of Informatics, The Graduate University for Advanced Studies, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Graduate University for Advanced Studies","institution_ids":["https://openalex.org/I184597095"]},{"raw_affiliation_string":"National Institute of Informatics, The Graduate University for Advanced Studies, Japan","institution_ids":["https://openalex.org/I200475212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014613205"],"corresponding_institution_ids":["https://openalex.org/I200475212"],"apc_list":null,"apc_paid":null,"fwci":0.6896,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.72704303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"37","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.815068781375885},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.6121167540550232},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39362239837646484}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.815068781375885},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.6121167540550232},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39362239837646484},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2014.6906329","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2014.6906329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338292","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W177792351","https://openalex.org/W1532313454","https://openalex.org/W1546137167","https://openalex.org/W1563061804","https://openalex.org/W1576185228","https://openalex.org/W1920802909","https://openalex.org/W2000497232","https://openalex.org/W2009250465","https://openalex.org/W2032451229","https://openalex.org/W2104692292","https://openalex.org/W2147029177","https://openalex.org/W2158060559","https://openalex.org/W2167994609","https://openalex.org/W6607292912","https://openalex.org/W6631629164","https://openalex.org/W6633671634"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Darknets":[0],"can":[1,107],"be":[2],"used":[3],"to":[4],"monitor":[5],"unexpected":[6],"network":[7,28],"traffic":[8,21,43,156],"destined":[9],"for":[10,24,71,117,155],"allocated":[11],"but":[12,80],"unused":[13],"IP":[14],"address":[15],"blocks,":[16],"thus":[17,76],"providing":[18],"an":[19],"effective":[20,81],"measurement":[22],"technique":[23],"viewing":[25],"certain":[26],"remote":[27],"security":[29],"events.":[30],"Past":[31],"works":[32,63],"in":[33,56,146,179],"this":[34],"field":[35],"discussed":[36],"the":[37,65,87,115,124,137,150,163],"possible":[38],"causes":[39],"(events)":[40],"of":[41,67,83,89,120,139,158,166],"darknet":[42,69,84,96,171],"and":[44,64,91,109,161],"applied":[45],"their":[46],"classification":[47],"schemes":[48],"on":[49,86,94,136,169],"short-range":[50],"traces.":[51],"Our":[52],"interest":[53],"lies,":[54],"however,":[55],"how":[57],"darknets":[58],"have":[59],"evolved":[60],"since":[61,143],"those":[62],"effectiveness":[66],"a":[68,78],"taxonomy":[70,82,116,168],"real":[72,95],"long-range":[73],"traffic.":[74],"We":[75,130],"propose":[77],"simple":[79,191],"traffic,":[85],"basis":[88],"observations,":[90],"evaluate":[92],"it":[93],"traces":[97,181],"covering":[98],"six":[99],"years.":[100],"The":[101],"evaluation":[102],"results":[103],"show":[104],"that":[105,176],"we":[106,174],"detect":[108],"label":[110],"anomalous":[111,141],"events":[112,142,189],"defined":[113],"by":[114,184],"over":[118],"96%":[119],"all":[121],"sources,":[122],"making":[123],"unlabeled":[125],"source":[126],"rate":[127],"extremely":[128],"low.":[129],"also":[131],"obtain":[132],"some":[133],"interesting":[134],"findings":[135],"evolution":[138],"different":[140,170],"2006":[144],"(especially":[145],"recent":[147],"years),":[148],"determine":[149],"most":[151,177],"appropriate":[152],"time":[153],"bin":[154],"analysis":[157],"our":[159,167,180],"traces,":[160],"highlight":[162],"general":[164],"applicability":[165],"datasets.":[172],"Finally,":[173],"conclude":[175],"sources":[178],"are":[182],"characterized":[183],"just":[185],"one":[186],"or":[187],"two":[188],"with":[190],"attack":[192],"mechanisms.":[193]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
