Darknet Traffic Analysis and Network Management for Malicious Intent Detection by Neural Network Frameworks

Darknet Traffic Analysis and Network Management for Malicious Intent Detection by Neural Network Frameworks

P. William, Siddhartha Choubey, Abha Choubey, Apurv Verma
DOI: 10.4018/978-1-6684-6444-1.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security breaches may be difficult to detect because attackers are continually tweaking methods to evade detection and utilize legitimate credentials that have already been deployed in network environments. Many firms have a way to resist the evolving sophistication of attacks in network traffic analysis technology. As cloud computing, DevOps, and the internet of things (IoT) become common, it has become more difficult to maintain network visibility. Automated detection of malicious intent using a weight-agnostic neural network architecture is possible with the authors' unique darknet traffic analysis and network management technology. Intelligent forensics tool for network traffic analysis and real-time identification of encrypted information is powerful. Automated neural network search techniques based on a weight-agnostic neural network (WANNs) approach may be used to discover zero-day threats. Many firms struggle to protect their important assets because of the effort required to identify malicious intent on the darknet manually. The advanced solution proposed here overcomes such obstacles.
Chapter Preview
Top

Introduction

Heterogeneous information systems (Yu and Guo,2019) that are interconnected exchange massive amounts of data in a relatively short time. Static and dynamic data are both included in this data. Constant data streams are required by the continuous flow paradigm, which prevents data from being stored either temporarily or permanently. Since of the system's limited memory, it is very difficult to retrieve flow data that has already been processed because it is either discarded or archived. In order to properly build, administer, and monitor the system's vital infrastructure, as well as monitor assaults and perform research on cybercrime, the analysis, monitoring, and categorization of Internet network traffic (Demertzis and Iliadis,2015) need a specialised solution and a useful tool.

Requests, responses, and control data are all examples of data types that may be sent across a network in the form of packets. When evaluating individual network packets, it is very difficult to make conclusions and eliminate safe conclusions since the information sent between network devices is separated into a number of packets that are connected and include all of the data. It is far more difficult to use standard mathematical analysis approaches because of the network traffic's unpredictable and accidental nature, which favours the network traffic modelling approach (LXing et al.,2020).

In order to make better decisions, many companies acquire as much web traffic data as possible and use it to assess and correlate it with the services they represent and to compare it with previous log files. Analyzing network traffic allows for safe inferences about the network, the users, and the total data consumption to be formed, allowing for the modelling of traffic in order to optimise network resources based on monitoring needs, as well as compliance with legal and security standards. There are a number of ways traffic analysis may be utilised in cybersecurity to safeguard services, guarantee the delivery of important data and find random causes of difficulties, modify or strengthen intrusion detection systems and identify cybercriminals (Yang and Liu,2019). Using traffic packet analysis technology has the following drawbacks: (Siswanto et al.,2019)

  • 1.

    In spite of the fact that the techniques are extremely effective at preventing DoS/DDoS attacks, buffer overflow attacks, and certain types of malwares, they can also be used to launch similar attacks from the adversary side, depending on their mode of operation;

  • 2.

    They complicate the operation of active network security methods and make them extremely difficult to manage. In addition, they use up more computer resources and severely slow down online transactions, especially encrypted traffic, which necessitates a higher degree of reconstruction of messages and entities;

  • 3.

    One drawback is the ease with which the recipient or sender of the text being analysed may be recognised, resulting in privacy concerns for both parties.

In the event of a zero-day attack, they are useless. Specialist analytic services are needed to get a thorough picture of the network environment and any risks, as the need for security services grows. With the help of global threat environment cyber threat data, this information allows for a targeted and knowledgeable response to cyber-related issues (Samrin and Vasumathi, 2019).

In essence, a fully automated cybersecurity environment is required for the information ecosystem and its vital applications. It is possible to identify known and new dangers and mitigate the risk to crucial data using a scalable troubleshooting or logging technique in these solutions (Mercaldo et al.,2019).

Complete Chapter List

Search this Book:
Reset