{"id":"https://openalex.org/W3086497842","doi":"https://doi.org/10.1109/medcomnet49392.2020.9191555","title":"Sensing the Noise: Uncovering Communities in Darknet Traffic","display_name":"Sensing the Noise: Uncovering Communities in Darknet Traffic","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3086497842","doi":"https://doi.org/10.1109/medcomnet49392.2020.9191555","mag":"3086497842"},"language":"en","primary_location":{"id":"doi:10.1109/medcomnet49392.2020.9191555","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medcomnet49392.2020.9191555","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Mediterranean Communication and Computer Networking Conference (MedComNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/245368354/10.1109_medcomnet49392.2020.9191555.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075022804","display_name":"Francesca Soro","orcid":"https://orcid.org/0000-0001-6738-8634"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesca Soro","raw_affiliation_strings":["Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032098108","display_name":"Mauro Allegretta","orcid":"https://orcid.org/0000-0002-2924-1639"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Allegretta","raw_affiliation_strings":["Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060087704","display_name":"Marco Mellia","orcid":"https://orcid.org/0000-0003-1859-6693"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Mellia","raw_affiliation_strings":["Politecnico di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Torino, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077745494","display_name":"Id\u00edlio Drago","orcid":"https://orcid.org/0000-0003-1932-1261"},"institutions":[{"id":"https://openalex.org/I55143463","display_name":"University of Turin","ror":"https://ror.org/048tbm396","country_code":"IT","type":"education","lineage":["https://openalex.org/I55143463"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Idilio Drago","raw_affiliation_strings":["Universit\u00e0 degli Studi di Torino, Torino, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Torino, Torino, Italy","institution_ids":["https://openalex.org/I55143463"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041098914","display_name":"Leandro M. Bertholdo","orcid":"https://orcid.org/0000-0002-4700-7707"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Leandro M. Bertholdo","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075022804"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":1.6121,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.85020399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8646883964538574},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8455312252044678},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.591725766658783},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.531893253326416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48702675104141235},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4841971695423126},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4768974781036377},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4646814167499542},{"id":"https://openalex.org/keywords/telnet","display_name":"Telnet","score":0.4423461854457855},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4108012914657593},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.40181756019592285},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3554936647415161},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.11594504117965698}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8646883964538574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8455312252044678},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.591725766658783},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.531893253326416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48702675104141235},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4841971695423126},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4768974781036377},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4646814167499542},{"id":"https://openalex.org/C2776538122","wikidata":"https://www.wikidata.org/wiki/Q160470","display_name":"Telnet","level":4,"score":0.4423461854457855},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4108012914657593},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40181756019592285},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3554936647415161},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.11594504117965698}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/medcomnet49392.2020.9191555","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medcomnet49392.2020.9191555","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Mediterranean Communication and Computer Networking Conference (MedComNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/55353ad0-cfe8-4f41-9b84-3113d05ba3d4","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/55353ad0-cfe8-4f41-9b84-3113d05ba3d4","pdf_url":"https://ris.utwente.nl/ws/files/245368354/10.1109_medcomnet49392.2020.9191555.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Soro, F, Allegretta, M, Drago, I, Mellia, M & Bertholdo, L M 2020, Sensing the Noise: Uncovering Communities in Darknet Traffic. in 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)., 9191555, IEEE, 18th Mediterranean Communication and Computer Networking Conference, MedComNet 2020, Arona, Italy, 17/06/20. https://doi.org/10.1109/MedComNet49392.2020.9191555","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/55353ad0-cfe8-4f41-9b84-3113d05ba3d4","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/55353ad0-cfe8-4f41-9b84-3113d05ba3d4","pdf_url":"https://ris.utwente.nl/ws/files/245368354/10.1109_medcomnet49392.2020.9191555.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Soro, F, Allegretta, M, Drago, I, Mellia, M & Bertholdo, L M 2020, Sensing the Noise: Uncovering Communities in Darknet Traffic. in 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)., 9191555, IEEE, 18th Mediterranean Communication and Computer Networking Conference, MedComNet 2020, Arona, Italy, 17/06/20. https://doi.org/10.1109/MedComNet49392.2020.9191555","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3086497842.pdf","grobid_xml":"https://content.openalex.org/works/W3086497842.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W50940840","https://openalex.org/W1828175806","https://openalex.org/W1989714227","https://openalex.org/W2000497232","https://openalex.org/W2031801461","https://openalex.org/W2073043478","https://openalex.org/W2081357650","https://openalex.org/W2083658929","https://openalex.org/W2103099347","https://openalex.org/W2131681506","https://openalex.org/W2132202037","https://openalex.org/W2151936673","https://openalex.org/W2157547297","https://openalex.org/W2167994609","https://openalex.org/W2343978497","https://openalex.org/W2491695530","https://openalex.org/W2526931032","https://openalex.org/W2573701107","https://openalex.org/W2738334271","https://openalex.org/W2768883253","https://openalex.org/W2916154162","https://openalex.org/W2963716433","https://openalex.org/W2976555458","https://openalex.org/W2981181114","https://openalex.org/W3099768174"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W2225089553","https://openalex.org/W3129800954","https://openalex.org/W2167330065","https://openalex.org/W2082456656","https://openalex.org/W2398634398","https://openalex.org/W2359215675","https://openalex.org/W4242181317"],"abstract_inverted_index":{"Darknets":[0,11],"are":[1,127,152],"ranges":[2],"of":[3,135,160,179,196,210,220,246,255],"IP":[4,136],"addresses":[5,137],"advertised":[6],"without":[7],"answering":[8],"any":[9],"traffic.":[10],"help":[12],"to":[13,57,71,129,148,214,242],"uncover":[14],"interesting":[15],"network":[16,22,165,193],"events,":[17],"such":[18,124],"as":[19,81,93,95],"misconfigurations":[20],"and":[21,50,61,187,201,257],"scans.":[23],"Interpreting":[24],"darknet":[25,79,90,247],"traffic":[26,44],"helps":[27],"against":[28],"cyber-attacks":[29],"-":[30],"e.g.,":[31],"malware":[32],"often":[33],"reaches":[34],"darknets":[35,46],"when":[36,216],"scanning":[37,191],"the":[38,59,78,89,96,113,158,170,192,204,218,244,253],"Internet":[39],"for":[40,54,115,132,156,174,252],"vulnerable":[41,197],"devices.":[42],"The":[43,164],"reaching":[45,74],"is":[47,102,189,212,233],"however":[48],"voluminous":[49],"noisy,":[51],"which":[52,84,99,151],"calls":[53],"efficient":[55],"ways":[56],"represent":[58,77,119],"data":[60],"highlight":[62],"possibly":[63],"important":[64],"events.":[65,259],"This":[66],"paper":[67],"evaluates":[68],"a":[69,82,161,177,185,234,238,249],"methodology":[70,241],"summarize":[72],"packets":[73,224],"darknets.":[75],"We":[76],"activity":[80],"graph,":[83],"captures":[85],"remote":[86],"hosts":[87,180],"contacting":[88,142],"nodes":[91],"ports,":[92],"well":[94],"frequency":[97],"at":[98],"each":[100],"port":[101],"reached.":[103],"From":[104],"these":[105],"representations,":[106],"we":[107,126],"apply":[108],"community":[109,171],"detection":[110,172],"algorithms":[111],"in":[112,141,194,229],"search":[114,195],"patterns":[116],"that":[117,138,176],"could":[118],"coordinated":[120,256],"activity.":[121],"By":[122],"highlighting":[123],"activities":[125],"able":[128],"group":[130,178],"together,":[131,155],"example,":[133,175],"groups":[134],"predominantly":[139],"engage":[140],"specific":[143],"targets,":[144],"or,":[145],"vice":[146],"versa,":[147],"identify":[149],"targets":[150],"frequently":[153],"contacted":[154],"exploiting":[157],"vulnerabilities":[159],"given":[162],"service.":[163],"analyst":[166],"can":[167],"recognize":[168],"from":[169],"results,":[173],"has":[181],"been":[182],"infected":[183],"by":[184,226],"botnet":[186],"it":[188],"currently":[190],"services":[198],"(e.g.,":[199],"SSH":[200],"Telnet":[202],"among":[203],"most":[205],"commonly":[206],"targeted).":[207],"Such":[208],"piece":[209],"information":[211],"impossible":[213],"obtain":[215],"analyzing":[217],"behavior":[219],"single":[221],"sources,":[222],"or":[223],"one":[225],"one.":[227],"All":[228],"all,":[230],"our":[231],"work":[232],"first":[235],"step":[236],"towards":[237],"comprehensive":[239],"aggregation":[240],"automate":[243],"analysis":[245],"traffic,":[248],"fundamental":[250],"aspect":[251],"recognition":[254],"anomalous":[258]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
