{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T16:30:11Z","timestamp":1769704211403,"version":"3.49.0"},"reference-count":55,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,8,24]]},"abstract":"<jats:p>The Darknet is a section of the internet that is encrypted and untraceable, making it a popular location for illicit and illegal activities. However, the anonymity and encryption provided by the network also make identifying and classifying network traffic significantly more difficult. The objective of this study was to provide a comprehensive review of the latest advancements in methods used for classifying darknet network traffic. The authors explored various techniques and methods used to classify traffic, along with the challenges and limitations faced by researchers and practitioners in this field. The study found that current methods for traffic classification in the Darknet have an average classification error rate of around 20%, due to the high level of anonymity and encryption present in the Darknet, which makes it difficult to extract features for classification. The authors analysed several quantitative values, including accuracy rates ranging from 60% to 97%, simplicity of execution ranging from 1 to 9 steps, real-time implementation ranging from less than 1 second to over 60 seconds, unknown traffic identification ranging from 30% to 95%, encrypted traffic classification ranging from 30% to 95%, and time and space complexity ranging from O(1) to O(2n). The study examined various approaches used to classify traffic in the Darknet, including machine learning, deep learning, and hybrid methods. The authors found that deep learning algorithms were effective in accurately classifying traffic on the Darknet, but the lack of labelled data and the dynamic nature of the Darknet limited their use. Despite these challenges, the study concluded that proper traffic classification is crucial for identifying malicious activity and improving the security of the Darknet. Overall, the study suggests that, although significant challenges remain, there is potential for further development and improvement of network traffic classification in the Darknet.<\/jats:p>","DOI":"10.3233\/jifs-231099","type":"journal-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T10:52:32Z","timestamp":1686912752000},"page":"3679-3700","source":"Crossref","is-referenced-by-count":9,"title":["The ascent of network traffic classification in the dark net: A survey"],"prefix":"10.1177","volume":"45","author":[{"given":"A.","family":"Jenefa","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, India"}]},{"given":"V.","family":"Edward Naveen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sri Shakthi Institute of Engineering and Technology, India"}]}],"member":"179","reference":[{"issue":"5","key":"10.3233\/JIFS-231099_ref1","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1002\/nem.1901","article-title":"A survey of methods for encrypted traffic classification and analysis,355\u2013","volume":"25","author":"Velan","year":"2015","journal-title":"International Journal of Network Management"},{"key":"10.3233\/JIFS-231099_ref2","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/s12243-020-00770-7","article-title":"A reviewon machine learning\u2013based approaches for Internet traffic classification","volume":"75","author":"Salman","year":"2020","journal-title":"Annals of Telecommunications"},{"key":"10.3233\/JIFS-231099_ref3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-642-36784-7_6","article-title":"Reviewing traffic classification","author":"Valenti","year":"2013","journal-title":"Data Traffic Monitoring and Analysis: From Measurement, Classification, and Anomaly Detection to Quality ofExperience"},{"issue":"4","key":"10.3233\/JIFS-231099_ref4","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/SURV.2008.080406","article-title":"A survey of techniques for internet traffic classification using machine learning","volume":"10","author":"Nguyen","year":"2008","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10.3233\/JIFS-231099_ref5","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.comnet.2019.04.004","article-title":"An innovative approach for real-time network traffic classification","volume":"158","author":"Dias","year":"2019","journal-title":"Computer Networks"},{"key":"10.3233\/JIFS-231099_ref6","unstructured":"Yoon, Sung-Ho , Park Jin-Wan , Park Jun-Sang , Oh Young-Seok and Kim Myung-Sup , Internet application traffic classification usingfixed IP-port. In Management Enabling the Future Internet for Changing Business and New Computing Services: 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009 Jeju, South Korea, September 23-25, 2009 Proceedings 12, pp. 21\u201330. Springer Berlin Heidelberg, (2009)."},{"key":"10.3233\/JIFS-231099_ref7","doi-asserted-by":"crossref","unstructured":"Aceto, Giuseppe, Alberto Dainotti, Walter De Donato and Antonio Pescap\u00e8, Port Load: taking the best of two worlds in trafficclassification. In 2010 INFOCOM IEEE Conference on ComputerCommunications Workshops, pp. 1\u20135. IEEE, 2010.","DOI":"10.1109\/INFCOMW.2010.5466645"},{"issue":"2","key":"10.3233\/JIFS-231099_ref8","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","article-title":"A survey of payload-based trafficclassification approaches","volume":"16","author":"Finsterbusch","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"10.3233\/JIFS-231099_ref9","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","article-title":"A survey of payload-based traffic classification approaches","volume":"16","author":"Finsterbusch","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.3233\/JIFS-231099_ref10","doi-asserted-by":"crossref","first-page":"638","DOI":"10.23919\/EUSIPCO55093.2022.9909683","article-title":"Payload-Based Network Traffic Analysis for Application Classification and Intrusion Detection","author":"\u00d6zdel","year":"2022","journal-title":"2022 30th European Signal Processing Conference (EUSIPCO)"},{"key":"10.3233\/JIFS-231099_ref11","first-page":"1","article-title":"Real-time traffic classification based on statistical and payload content features","author":"Dehghani","year":"2010","journal-title":"2010 2nd international workshop on intelligent systems and applications"},{"issue":"12","key":"10.3233\/JIFS-231099_ref12","doi-asserted-by":"crossref","first-page":"2550","DOI":"10.3390\/app9122550","article-title":"Payload-based traffic classification using multi-layer lstm in software defined networks","volume":"9","author":"Lim","year":"2019","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-231099_ref13","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TrustCom50675.2020.00064","article-title":"Traffic classification of user behaviors in tor, i2p, zeronet, freenet","author":"Hu","year":"2020","journal-title":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computingand Communications (TrustCom)"},{"issue":"1","key":"10.3233\/JIFS-231099_ref14","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1002\/sec.755","article-title":"An empirical study of morphing on behavior-based network traffic classification","volume":"8","author":"Qu","year":"2015","journal-title":"Security and Communication Networks"},{"key":"10.3233\/JIFS-231099_ref15","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.inffus.2021.02.009","article-title":"Network traffic classification for data fusion: A survey","volume":"72","author":"Zhao","year":"2021","journal-title":"Information Fusion"},{"issue":"1","key":"10.3233\/JIFS-231099_ref16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.17648\/jisc.v8i1.79","article-title":"Flow Feature-Based Network Traffic Classification Using Machine Learning","volume":"8","author":"de Menezes","year":"2021","journal-title":"Journal of Information Security and Cryptography (Enigma)"},{"key":"10.3233\/JIFS-231099_ref17","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/978-3-540-31966-5_25","article-title":"Traffic classification using astatistical approach","author":"Zuev","year":"2005","journal-title":"Passive and Active Network Measurement: 6th International Workshop, PAM 2005, Boston, MA, USA, March 31-April 1, 2005. Proceedings 6"},{"issue":"4","key":"10.3233\/JIFS-231099_ref18","doi-asserted-by":"crossref","first-page":"e4394","DOI":"10.1002\/ett.4394","article-title":"From statistical-to machine learning-based network traffic prediction","volume":"33","author":"Lohrasbinasab","year":"2022","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.3233\/JIFS-231099_ref19","first-page":"229","article-title":"BLINC: multilevel traffic classification in the dark","author":"Karagiannis","year":"2005","journal-title":"Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications"},{"key":"10.3233\/JIFS-231099_ref20","first-page":"250","article-title":"Automated traffic classification and application identification using machine learning","author":"Zander","journal-title":"Proc. 2005 IEEE Conference on Local Computer Networks"},{"key":"10.3233\/JIFS-231099_ref21","first-page":"205","article-title":"Flow clustering using machine learning techniques","author":"McGregor","journal-title":"Proc. 2004 Passive and Active Measurement Workshop"},{"key":"10.3233\/JIFS-231099_ref22","first-page":"281","article-title":"Traffic classification using clustering algorithms","author":"Erman","journal-title":"Proc. 2006 SIGCOMM Workshop on Mining Network Data"},{"key":"10.3233\/JIFS-231099_ref23","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1071690.1064220","article-title":"Internet traffic classification using Bayesian analysis techniques, SIGMETRICS Perform","volume":"33","author":"Moore","year":"2005","journal-title":"Eval. Rev."},{"key":"10.3233\/JIFS-231099_ref24","first-page":"1","article-title":"traffic classification demystified: myths, caveats, and the best practices","author":"Kim","journal-title":"Proc. 2008 ACM CoNEXT Conference"},{"issue":"14","key":"10.3233\/JIFS-231099_ref25","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1016\/j.comnet.2009.05.003","article-title":"Support vector machines for TCP traffic classification","volume":"53","author":"Este","year":"2009","journal-title":"Computer Networks"},{"key":"10.3233\/JIFS-231099_ref26","first-page":"237","article-title":"A method for classification of network traffic based on C5.0 machine learning algorithm","author":"Bujlow","year":"2012","journal-title":"Proceedings of the International Conference on Computing, Networking and Communications (ICNC\u201912)"},{"key":"10.3233\/JIFS-231099_ref27","doi-asserted-by":"crossref","unstructured":"carela-Espanol Valentin , Barlet-Ros Pere , Mula-Valls Oriol and Sole-Pareta Josep , An Automatic Traffic Classification System for network operation and Management, Springer, October, 2013.","DOI":"10.1007\/s10922-013-9293-1"},{"key":"10.3233\/JIFS-231099_ref28","first-page":"1","article-title":"Internet traffic identificationusing machine learning","author":"Erman","journal-title":"Proc. 2006 IEEE Global Telecommunications Conference"},{"key":"10.3233\/JIFS-231099_ref29","doi-asserted-by":"crossref","unstructured":"Bakhshi T. and Ghita B. , On Internet traffic Classification: A Two-Phased Machine Learning Approach, Journal of Computer Networks and Communications, 2016.","DOI":"10.1155\/2016\/2048302"},{"issue":"4","key":"10.3233\/JIFS-231099_ref30","doi-asserted-by":"crossref","first-page":"1257","DOI":"10.1109\/TNET.2014.2320577","article-title":"Robust networktraffic classification","volume":"23","author":"Zhang","year":"2015","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.3233\/JIFS-231099_ref31","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/ICICI.2017.8365196","article-title":"Multi level statistical classification of network traffic","author":"Jenefa","year":"2017","journal-title":"2017 InternationalConference on Inventive Computing and Informatics (ICICI)"},{"key":"10.3233\/JIFS-231099_ref32","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/ICOEI.2018.8553826","article-title":"Moses, An Upgraded C5. 0 Algorithm forNetwork Application Identification","author":"Jenefa","year":"2018","journal-title":"2018 2nd InternationalConference on Trends in Electronics and Informatics (ICOEI)"},{"issue":"3","key":"10.3233\/JIFS-231099_ref33","doi-asserted-by":"crossref","first-page":"5139","DOI":"10.3233\/JIFS-201895","article-title":"A multi-phased statisticallearning based classification for network traffic","volume":"40","author":"Jenefa","year":"2021","journal-title":"Journal ofIntelligent & Fuzzy Systems"},{"key":"10.3233\/JIFS-231099_ref34","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","article-title":"Traffic classification on the fly","volume":"36","author":"Bernaille","year":"2006","journal-title":"SIGCOMM Comput. Commun.Rev."},{"issue":"6","key":"10.3233\/JIFS-231099_ref35","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1093\/jigpal\/jzac002","article-title":"Unsupervised network traffic anomaly detection with deep auto encoders","volume":"30","author":"Dutta","year":"2022","journal-title":"Logic Journal of the IGPL"},{"key":"10.3233\/JIFS-231099_ref36","first-page":"366","article-title":"Encrypted network traffic classification using self-supervised learning","author":"Towhid","journal-title":"2022 IEEE 8thInternational Conference on Network Softwarization (NetSoft)"},{"key":"10.3233\/JIFS-231099_ref37","doi-asserted-by":"crossref","first-page":"2576","DOI":"10.1145\/3534678.3539314","article-title":"MT-Flow Former: A Semi-Supervised Flow Transformer for Encrypted Traffic Classification","author":"Zhao","year":"2022","journal-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"},{"key":"10.3233\/JIFS-231099_ref38","first-page":"401","article-title":"Traffic Classification Based on CNN-LSTM Hybrid Network","author":"Kong","year":"2021","journal-title":"Digital TV and Wireless Multimedia Communications: 18th International Forum, IFTC 2021, Shanghai, China, December 3\u20134, 2021, Revised Selected Papers"},{"issue":"3","key":"10.3233\/JIFS-231099_ref39","doi-asserted-by":"crossref","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","article-title":"Deep packet: A novel approach for encrypted traffic classification using deep learning","volume":"24","author":"Lotfollahi","year":"2020","journal-title":"Soft Computing"},{"key":"10.3233\/JIFS-231099_ref40","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/ICCNC.2017.7876241","article-title":"Application identification via network traffic classification","author":"Yamansavascilar","year":"2017","journal-title":"2017 International Conference on Computing, Networking and Communications (ICNC)"},{"key":"10.3233\/JIFS-231099_ref41","doi-asserted-by":"crossref","first-page":"175637","DOI":"10.1109\/ACCESS.2020.3026831","article-title":"Fpga-based network traffic classification using machine learning","volume":"8","author":"Elnawawy","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231099_ref42","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/978-3-030-25109-3_9","article-title":"A detailed analysis of the cicids2017 data set","author":"Sharafaldin","year":"2019","journal-title":"Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal-Madeira, Portugal, January 22-24, 2018, Revised Selected Papers 4"},{"issue":"3","key":"10.3233\/JIFS-231099_ref43","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/3308897.3308961","article-title":"Malalert: Detecting malware in large-scale network traffic using statistical features","volume":"46","author":"Piskozub","year":"2019","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"issue":"5","key":"10.3233\/JIFS-231099_ref44","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TSMCC.2010.2048428","article-title":"Toward credible evaluation of anomaly-based intrusion-detection methods","volume":"40","author":"Tavallaee","year":"2010","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C(Applications and Reviews)"},{"key":"10.3233\/JIFS-231099_ref45","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"10.3233\/JIFS-231099_ref46","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10922-021-09639-z","article-title":"Network traffic classification using deep learning networks and Bayesian datafusion","volume":"30","author":"Izadi","year":"2022","journal-title":"Journal of Network and Systems Management"},{"key":"10.3233\/JIFS-231099_ref47","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.neucom.2022.03.007","article-title":"ABL-TC: A lightweight design for network traffic classification empowered by deep learning","volume":"489","author":"Wei","year":"2022","journal-title":"Neurocomputing"},{"issue":"2022","key":"10.3233\/JIFS-231099_ref48","first-page":"108024","article-title":"Network traffic classification using convolutional neural network and ant-lion optimization","volume":"101","author":"Izadi","journal-title":"Computers and Electrical Engineering"},{"issue":"9","key":"10.3233\/JIFS-231099_ref49","doi-asserted-by":"crossref","first-page":"10741","DOI":"10.1007\/s10489-021-03032-8","article-title":"MTT: anefficient model for encrypted network traffic classification usingmulti-task transformer","volume":"52","author":"Zheng","year":"2022","journal-title":"Applied Intelligence"},{"key":"10.3233\/JIFS-231099_ref50","doi-asserted-by":"crossref","first-page":"102632","DOI":"10.1016\/j.cose.2022.102632","article-title":"Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing","volume":"115","author":"Zola","year":"2022","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-231099_ref51","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/NetSoft54395.2022.9844044","article-title":"Encrypted network trafficclassification using self-supervised learning","author":"Towhid","year":"2022","journal-title":"2022 IEEE 8thInternational Conference on Network Softwarization (NetSoft)"},{"key":"10.3233\/JIFS-231099_ref52","doi-asserted-by":"crossref","first-page":"41874","DOI":"10.1109\/ACCESS.2022.3167814","article-title":"Industrial control system anomaly detection and classification based on network traffic","volume":"10","author":"Jiang","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/JIFS-231099_ref53","doi-asserted-by":"crossref","first-page":"165","DOI":"10.2298\/CSIS200424038K","article-title":"Deep RNN-based network traffic classification scheme in edge computing system","volume":"19","author":"Kim","year":"2022","journal-title":"Computer Science and Information Systems"},{"issue":"2","key":"10.3233\/JIFS-231099_ref54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3488375","article-title":"Network traffic generation: A survey and methodology","volume":"55","author":"Adeleke","year":"2022","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.3233\/JIFS-231099_ref55","first-page":"100471","article-title":"A hybrid deeplearning based intrusion detection system using spatial-temporalrepresentation of in-vehicle network traffic","volume":"35","author":"Lo","year":"2022","journal-title":"VehicularCommunications"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-231099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T05:22:51Z","timestamp":1769664171000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-231099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-231099","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,24]]}}}