Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web

Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web

Shruthi J., Sumathi M. S., Bharathi R., Vidya R. Pai
DOI: 10.4018/978-1-6684-3942-5.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Companies must foresee most critical security threats to keep one step ahead of attackers. Because attackers always refine their techniques to avoid detection and because attackers are persistently imaginative, network traffic analysis solutions have evolved providing organizations with a feasible path forward. Maintaining network visibility has gotten more challenging and time demanding as DevOps, cloud computing, and IoT (internet of things) gain popularity. Network traffic analysis can incorporate its core functionalities to detect malicious intent. The authors developed a unique darknet traffic analysis and network management solution to automate the malicious intent detection process. This strong computational intelligence forensics tool decodes network traffic, viral traffic, and encrypted communication. WANNs, a weight-independent neural network design, can detect zero-day threats. With a sophisticated solution, many businesses can protect their most valuable assets from malicious intent detection on the dark web.
Chapter Preview
Top

Introduction

Only a small percentage of us have even scratched the surface of what the Internet can provide. A search engine like Google, Yahoo, or Bing only displays 4% of the total information on the internet. Additional 96 percent can only be accessed by specialised research on individual websites, subpages, closed access publications, archives and so on. The Deep Web contains this information (Mo, 2020). Everything we do online, with the exception of the Dark Web-obscured portions of the deep web, may be seen, traced, and, in some cases, monitored. There are three ways to look at the internet as a sea of information.

  • Surface Web: There are no restrictions on the Surface Web, making it available to everyone. As a whole, it's referred to as the Internet. Search engines like Google, Bing, Yahoo, and more index everything on the Internet's surface (Rawat et al., 2021).

  • Deep Web: All material that is not publicly available because search engines do not index it can be found in the “Deep Web.” To access the deep web, which contains 96% of all internet data, you'll need special authorization.

  • Dark Web: In the “Dark Web,” which is only one percent of the deep web, all illegal activity is taking place.

If you’re personal information is discovered on the dark web, there is a good chance that anyone who stumbles across it will be able to access it (Tian et al., 2019). Personal information, bank account information, credit card or debit card information, medical records, credentials, and many other types of data may be included. A company's brand might be tarnished as well as its employees' and shareholders' financial well-being if confidential data is released. When it comes to preventing or mitigating harm from these attacks and data leaks, monitoring the Dark Web is the best option (Rawat et al., 2021)

Monitoring services for the dark web have received a lot of attention in the last two years. However, there is a widespread misunderstanding regarding how or if Dark Web monitoring services work, or even exist at all. Doing so would be a near-impossible undertaking and they would not be able to begin removing data or property that had been illegally obtained (Rajawat et al., 2021). There's sometimes nothing you can do to stop something from being sold or misused once it's on an underground commercial centre. Only publicly available content can be viewed by the Dark Web Monitoring. Just like search engine crawlers can't view anything behind a login or paywall, dark web scanners can't access anything that has been protected from scraping software (Demertzis et al., 2020). Passwords and other identification information, such as social security numbers, are not the focus of their attention.

Complete Chapter List

Search this Book:
Reset