{"id":"https://openalex.org/W2976555458","doi":"https://doi.org/10.1109/lanman.2019.8847113","title":"Are Darknets All The Same? On Darknet Visibility for Security Monitoring","display_name":"Are Darknets All The Same? On Darknet Visibility for Security Monitoring","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2976555458","doi":"https://doi.org/10.1109/lanman.2019.8847113","mag":"2976555458"},"language":"en","primary_location":{"id":"doi:10.1109/lanman.2019.8847113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lanman.2019.8847113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/11368/3025204","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075022804","display_name":"Francesca Soro","orcid":"https://orcid.org/0000-0001-6738-8634"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesca Soro","raw_affiliation_strings":["Politecnico di Torino"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077745494","display_name":"Id\u00edlio Drago","orcid":"https://orcid.org/0000-0003-1932-1261"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Idilio Drago","raw_affiliation_strings":["Politecnico di Torino"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061815649","display_name":"Martino Trevisan","orcid":"https://orcid.org/0000-0002-4258-4679"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Martino Trevisan","raw_affiliation_strings":["Politecnico di Torino"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060087704","display_name":"Marco Mellia","orcid":"https://orcid.org/0000-0003-1859-6693"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Mellia","raw_affiliation_strings":["Politecnico di Torino"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058398803","display_name":"Jo\u00e3o Marcelo Ceron","orcid":"https://orcid.org/0000-0001-6847-8025"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Joao Ceron","raw_affiliation_strings":["University of Twente"],"affiliations":[{"raw_affiliation_string":"University of Twente","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044310143","display_name":"Jos\u00e9 Jair Santanna","orcid":"https://orcid.org/0000-0002-8361-6729"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jose J. Santanna","raw_affiliation_strings":["University of Twente"],"affiliations":[{"raw_affiliation_string":"University of Twente","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5075022804"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":2.0428,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.88301948,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8150235414505005},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.645962655544281},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6415579319000244},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6409949660301208},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.6107629537582397},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5964177846908569},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5837079286575317},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5381553769111633},{"id":"https://openalex.org/keywords/arp-spoofing","display_name":"ARP spoofing","score":0.5084787607192993},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.46775031089782715},{"id":"https://openalex.org/keywords/ip-tunnel","display_name":"IP tunnel","score":0.4605608880519867},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.4352734088897705},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.4229731261730194},{"id":"https://openalex.org/keywords/ip-address","display_name":"Ip address","score":0.4196426272392273},{"id":"https://openalex.org/keywords/economic-shortage","display_name":"Economic shortage","score":0.41273263096809387},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.38626641035079956},{"id":"https://openalex.org/keywords/ip-address-management","display_name":"IP address management","score":0.34156984090805054},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.2738058865070343},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.24568790197372437},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14679449796676636},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.10082706809043884}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8150235414505005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.645962655544281},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6415579319000244},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6409949660301208},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.6107629537582397},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5964177846908569},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5837079286575317},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5381553769111633},{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.5084787607192993},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.46775031089782715},{"id":"https://openalex.org/C10790986","wikidata":"https://www.wikidata.org/wiki/Q442343","display_name":"IP tunnel","level":4,"score":0.4605608880519867},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.4352734088897705},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.4229731261730194},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.4196426272392273},{"id":"https://openalex.org/C194051981","wikidata":"https://www.wikidata.org/wiki/Q1337691","display_name":"Economic shortage","level":3,"score":0.41273263096809387},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.38626641035079956},{"id":"https://openalex.org/C201980515","wikidata":"https://www.wikidata.org/wiki/Q13219707","display_name":"IP address management","level":4,"score":0.34156984090805054},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.2738058865070343},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.24568790197372437},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14679449796676636},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.10082706809043884},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/lanman.2019.8847113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lanman.2019.8847113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/282fbba6-5c41-4b00-a350-5f607a95a52b","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/282fbba6-5c41-4b00-a350-5f607a95a52b","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Soro, F, Drago, I, Trevisan, M, Mellia, M, Ceron, J & Santanna, J J 2019, Are darknets all the same? On darknet visibility for security monitoring. in 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019., 8847113, IEEE Workshop on Local and Metropolitan Area Networks, vol. 2019-July, IEEE, 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019, Paris, France, 1/07/19. https://doi.org/10.1109/LANMAN.2019.8847113","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:arts.units.it:11368/3025204","is_oa":true,"landing_page_url":"http://hdl.handle.net/11368/3025204","pdf_url":null,"source":{"id":"https://openalex.org/S4306400480","display_name":"ArTS Archivio della ricerca di Trieste (University of Trieste https://www.units.it/)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I142444530","host_organization_name":"University of Trieste","host_organization_lineage":["https://openalex.org/I142444530"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:arts.units.it:11368/3025204","is_oa":true,"landing_page_url":"http://hdl.handle.net/11368/3025204","pdf_url":null,"source":{"id":"https://openalex.org/S4306400480","display_name":"ArTS Archivio della ricerca di Trieste (University of Trieste https://www.units.it/)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I142444530","host_organization_name":"University of Trieste","host_organization_lineage":["https://openalex.org/I142444530"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W148447563","https://openalex.org/W284347760","https://openalex.org/W1546137167","https://openalex.org/W1828175806","https://openalex.org/W1965761857","https://openalex.org/W1989714227","https://openalex.org/W1990882054","https://openalex.org/W2000497232","https://openalex.org/W2031801461","https://openalex.org/W2078021840","https://openalex.org/W2081357650","https://openalex.org/W2092043296","https://openalex.org/W2103099347","https://openalex.org/W2138845856","https://openalex.org/W2152436591","https://openalex.org/W2172084670","https://openalex.org/W2198011964","https://openalex.org/W2343978497","https://openalex.org/W2768883253","https://openalex.org/W2887191638","https://openalex.org/W6610362903","https://openalex.org/W6632538867"],"related_works":["https://openalex.org/W2106101296","https://openalex.org/W2127007818","https://openalex.org/W2036690440","https://openalex.org/W366572230","https://openalex.org/W164724843","https://openalex.org/W2377214228","https://openalex.org/W2105117356","https://openalex.org/W2125573583","https://openalex.org/W1773428617","https://openalex.org/W2162571024"],"abstract_inverted_index":{"Darknets":[0],"are":[1,7,32],"sets":[2],"of":[3,53,64,74,89,109,125,179],"IP":[4,59,75,115,170,181],"addresses":[5,76,127],"that":[6,134],"advertised":[8],"but":[9],"do":[10],"not":[11],"host":[12],"any":[13],"client":[14],"or":[15],"server.":[16],"By":[17,92],"passively":[18],"recording":[19],"the":[20,49,87,123,129,147,162,177,180,185],"incoming":[21],"packets,":[22],"they":[23,30],"assist":[24],"network":[25],"monitoring":[26],"activities.":[27],"Since":[28],"packets":[29],"receive":[31],"unsolicited":[33],"by":[34],"definition,":[35],"darknets":[36,98,166],"help":[37],"to":[38,77,176],"spot":[39],"misconfigurations":[40],"as":[41,43,48,146,172,174],"well":[42,173],"important":[44],"security":[45],"events,":[46],"such":[47,145],"appearance":[50],"and":[51,154],"spread":[52],"botnets,":[54],"DDoS":[55],"attacks":[56],"using":[57],"spoofed":[58],"address,":[60],"etc.":[61],"A":[62],"number":[63],"organizations":[65],"worldwide":[66],"deploys":[67],"darknets,":[68],"ranging":[69],"from":[70,96,165],"a":[71],"few":[72],"dozens":[73],"large":[78],"/8":[79],"networks.":[80],"We":[81,157],"here":[82],"investigate":[83],"how":[84],"similar":[85],"is":[86,119],"visibility":[88,140],"different":[90,101,169],"darknets.":[91],"relying":[93],"on":[94,128],"traffic":[95,164],"three":[97],"deployed":[99,167],"in":[100,107,161,168],"contintents,":[102],"we":[103],"evaluate":[104],"their":[105,113],"exposure":[106],"terms":[108],"observed":[110,163],"events":[111],"given":[112],"allocated":[114,183],"addresses.":[116],"The":[117],"latter":[118],"particularly":[120],"relevant":[121],"considering":[122],"shortage":[124],"IPv4":[126],"Internet.":[130],"Our":[131],"results":[132],"suggest":[133],"some":[135],"well-known":[136],"facts":[137],"about":[138],"darknet":[139],"seem":[141],"invariant":[142],"across":[143],"deployments,":[144],"most":[148],"commonly":[149],"contacted":[150],"ports.":[151],"However,":[152],"size":[153,178],"location":[155],"matter.":[156],"find":[158],"significant":[159],"differences":[160],"ranges":[171],"according":[175],"range":[182],"for":[184],"monitoring.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
