{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:26:13Z","timestamp":1773933973926,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05868-y","type":"journal-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T13:20:59Z","timestamp":1767014459000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SafeSurf Darknet 2025: A novel dataset for darknet traffic detection and analysis"],"prefix":"10.1007","volume":"29","author":[{"given":"Qasem","family":"Abu Al-Haija","sequence":"first","affiliation":[]},{"given":"Mohammad J.","family":"Obaidat","sequence":"additional","affiliation":[]},{"given":"Ibrahim A.","family":"Al-Syouf","sequence":"additional","affiliation":[]},{"given":"Yahea F.","family":"Awawdeh","sequence":"additional","affiliation":[]},{"given":"Anas E.","family":"Masa\u2019deh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,29]]},"reference":[{"issue":"1","key":"5868_CR1","doi-asserted-by":"publisher","first-page":"891","DOI":"10.32604\/csse.2023.039374","volume":"47","author":"A Munshi","year":"2023","unstructured":"Munshi, A., Alotaibi, M., Alotaibi, S., Al-Sabban, W., Allheeib, N.: Detecting and classifying Darknet traffic using deep network chains. Comput. Syst. Sci. Eng. 47(1), 891\u2013902 (2023). https:\/\/doi.org\/10.32604\/csse.2023.039374","journal-title":"Comput. Syst. Sci. Eng."},{"key":"5868_CR2","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10257-023-00626-2","volume":"23","author":"A Almomani","year":"2025","unstructured":"Almomani, A.: Darknet traffic analysis and classification system based on modified stacking ensemble learning algorithms. Inf. Syst. E-Bus. Manag. 23, 209\u2013240 (2025). https:\/\/doi.org\/10.1007\/s10257-023-00626-2","journal-title":"Inf. Syst. E-Bus. Manag."},{"key":"5868_CR3","unstructured":"OffSec: Installing Tor Browser on Kali Linux. Kali Linux Documentation. Available at https:\/\/www.kali.org\/docs\/tools\/tor\/ (2024). Accessed 6 Feb 2025"},{"key":"5868_CR4","doi-asserted-by":"publisher","unstructured":"Al-Fayoumi, M., Elayyan, A., Odeh, A., Al-Haija, Q.A.: Tor network traffic classification using machine learning based on time-related features. In: 6th Smart Cities Symposium (SCS 2022), Hybrid Conference, Bahrain, pp. 92\u201397 (2022). https:\/\/doi.org\/10.1049\/icp. 2023.0354","DOI":"10.1049\/icp"},{"key":"5868_CR5","doi-asserted-by":"publisher","first-page":"556","DOI":"10.3390\/electronics11040556","volume":"11","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija, Q., Krichen, M., Abu Elhaija, W.: Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11, 556 (2022). https:\/\/doi.org\/10.3390\/electronics11040556","journal-title":"Electronics"},{"key":"5868_CR6","doi-asserted-by":"publisher","unstructured":"Hu, Y., Zou, F., Li, L., Yi, P.: Traffic classification of user behaviors in Tor, I2P, ZeroNet, Freenet. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, pp. 418\u2013424 (2020). https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00064","DOI":"10.1109\/TrustCom50675.2020.00064"},{"key":"5868_CR7","doi-asserted-by":"crossref","unstructured":"Alimoradi, M., Zabihimayvan, M., Daliri, A., Sledzik, R., Sadeghi, R. (2022) Deep neural classification of darknet traffic. In: Artificial Intelligence Research and Development. IOS Press, Amsterdam, pp. 105\u2013114","DOI":"10.3233\/FAIA220323"},{"key":"5868_CR8","doi-asserted-by":"publisher","unstructured":"Rawashdeh, M., Al-Haija, Q.A., Qasaimeh, M.: Analysis of TOR artifacts and traffic in windows 11: a virtual lab approach and dataset creation. In: 2023 14th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/ICICS60529.2023.10330539","DOI":"10.1109\/ICICS60529.2023.10330539"},{"key":"5868_CR9","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related methods. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), 19 Feb 2016, pp. 407\u2013414","DOI":"10.5220\/0005740704070414"},{"issue":"2","key":"5868_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.4018\/IJWNBT.2020070104","volume":"9","author":"S Miller","year":"2020","unstructured":"Miller, S., Curran, K., Lunney, T.: Detection of virtual private network traffic using machine learning. Int. J. Wirel. Networks Broadband Technol. 9(2), 60\u201380 (2020)","journal-title":"Int. J. Wirel. Networks Broadband Technol."},{"key":"5868_CR11","doi-asserted-by":"publisher","unstructured":"Yin, H., He, Y.: I2P anonymous traffic detection and identification. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, pp. 157\u2013162 (2019). https:\/\/doi.org\/10.1109\/ICACCS.2019.8728517","DOI":"10.1109\/ICACCS.2019.8728517"},{"key":"5868_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108158","volume":"194","author":"R Mag\u00e1n-Carri\u00f3n","year":"2021","unstructured":"Mag\u00e1n-Carri\u00f3n, R., Abell\u00e1n-Galera, A., Maci\u00e1-Fern\u00e1ndez, G., Garc\u00eda-Teodoro, P.: Unveiling the I2P web structure: a connectivity analysis. Comput. Netw. 194, 108158 (2021)","journal-title":"Comput. Netw."},{"issue":"11","key":"5868_CR13","doi-asserted-by":"publisher","first-page":"654","DOI":"10.12720\/jcm.13.11.654-660","volume":"13","author":"S Lee","year":"2018","unstructured":"Lee, S., Shin, S.H., Roh, B.H.: Classification of freenet traffic flow based on a machine learning model. J. Commun. 13(11), 654\u2013660 (2018)","journal-title":"J. Commun."},{"key":"5868_CR14","doi-asserted-by":"publisher","unstructured":"Xu, Y., Yang, M., Ling, Z., Liu, Z., Gu, X., Luo, L.: A de-anonymization attack against downloaders in freenet. In: IEEE INFOCOM 2024\u2014IEEE Conference on Computer Communications, Vancouver, BC, Canada, pp. 1\u201310 (2024). https:\/\/doi.org\/10.1109\/INFOCOM52122.2024.10621209","DOI":"10.1109\/INFOCOM52122.2024.10621209"},{"key":"5868_CR15","doi-asserted-by":"publisher","unstructured":"Wang, S., Gao, Y., Shi, J., Wang, X., Zhao, C., Yin, Z.: Look deep into the new deep network: a measurement study on the ZeroNet. In: Krzhizhanovskaya, V., et al. (eds.) Computational Science\u2014ICCS 2020. ICCS 2020. Lecture Notes in Computer Science, vol. 12137. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50371-0_44","DOI":"10.1007\/978-3-030-50371-0_44"},{"issue":"6","key":"5868_CR16","first-page":"1371","volume":"39","author":"M Merouane","year":"2023","unstructured":"Merouane, M.: Convenient detection method for anonymous networks: I2P vs. Tor. J. Inf. Sci. Eng. 39(6), 1371\u20131382 (2023)","journal-title":"J. Inf. Sci. Eng."},{"key":"5868_CR17","doi-asserted-by":"publisher","first-page":"42423","DOI":"10.1109\/ACCESS.2024.3373769","volume":"12","author":"J Saleem","year":"2024","unstructured":"Saleem, J., Islam, R., Islam, M.Z.: Darknet traffic analysis: a systematic literature review. IEEE Access 12, 42423\u201342452 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3373769","journal-title":"IEEE Access"},{"key":"5868_CR18","doi-asserted-by":"crossref","unstructured":"Al-Haija, Q.A., Ibrahim, R. (2023) Introduction to dark web. In: Perspectives on ethical hacking and penetration testing. IGI Global, New York, pp. 114\u2013138","DOI":"10.4018\/978-1-6684-8218-6.ch005"},{"issue":"2","key":"5868_CR19","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13726","volume":"42","author":"QA Al-Haija","year":"2025","unstructured":"Al-Haija, Q.A., Droos, A.: A comprehensive survey on deep learning-based intrusion detection systems in internet of things (IoT). Expert. Syst. 42(2), e13726 (2025). https:\/\/doi.org\/10.1111\/exsy.13726","journal-title":"Expert. Syst."},{"key":"5868_CR20","unstructured":"Freenet Project: Download Freenet. Available at https:\/\/staging.freenetproject.org\/es\/pages\/download.html (2024). Accessed 2 Apr 2025"},{"key":"5868_CR21","unstructured":"ZeroNet Project: ZeroNet: Decentralized Websites Using Bitcoin Cryptography. Available at https:\/\/zeronet.io\/ (2024). Accessed 16 June 2025"},{"key":"5868_CR22","unstructured":"I2P Project: I2P Anonymous Network. Available at https:\/\/geti2p.net\/en\/research (2024). Accessed 6 Feb 2025"},{"key":"5868_CR23","unstructured":"I2P Project: I2P: The Invisible Internet Project. Available at: https:\/\/geti2p.net\/en\/ (2024). Accessed 12 Mar 2025"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05868-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05868-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05868-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:09:00Z","timestamp":1773925740000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05868-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,29]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5868"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05868-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,29]]},"assertion":[{"value":"10 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"65"}}