Malware traffic classification using convolutional neural network for representation learning
W Wang, M Zhu, X Zeng, X Ye… - 2017 International …, 2017 - ieeexplore.ieee.org
Traffic classification is the first step for network anomaly detection or network based intrusion
detection system and plays an important role in network security domain. In this paper we …
detection system and plays an important role in network security domain. In this paper we …
[PDF][PDF] Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun… - Proceedings of the …, 2016 - scitepress.org
Traffic characterization is one of the major challenges in today's security industry. The
continuous evolution and generation of new applications and services, together with the …
continuous evolution and generation of new applications and services, together with the …
Issues and future directions in traffic classification
A Dainotti, A Pescape, KC Claffy - IEEE network, 2012 - ieeexplore.ieee.org
Traffic classification technology has increased in relevance this decade, as it is now used in
the definition and implementation of mechanisms for service differentiation, network design …
the definition and implementation of mechanisms for service differentiation, network design …
[图书][B] Conformal prediction for reliable machine learning: theory, adaptations and applications
The conformal predictions framework is a recent development in machine learning that can
associate a reliable measure of confidence with a prediction in any real-world pattern …
associate a reliable measure of confidence with a prediction in any real-world pattern …
A machine learning approach for feature selection traffic classification using security analysis
Class imbalance has become a big problem that leads to inaccurate traffic classification.
Accurate traffic classification of traffic flows helps us in security monitoring, IP management …
Accurate traffic classification of traffic flows helps us in security monitoring, IP management …
Identifying IoT devices and events based on packet length from encrypted traffic
Recently, machine learning algorithms have been used to identify Internet of Things (IoT)
devices and events. However, existing proposals may inspect the packet payload, what …
devices and events. However, existing proposals may inspect the packet payload, what …
Malware traffic classification using domain adaptation and ladder network for secure industrial internet of things
Malware traffic classification (MTC) is a key technology for anomaly and intrusion detection
in secure Industrial Internet of Things (IIoT). Traditional MTC methods based on port …
in secure Industrial Internet of Things (IIoT). Traditional MTC methods based on port …
Detection and classification of peer-to-peer traffic: A survey
The emergence of new Internet paradigms has changed the common properties of network
data, increasing the bandwidth consumption and balancing traffic in both directions. These …
data, increasing the bandwidth consumption and balancing traffic in both directions. These …
Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?
R Alshammari, AN Zincir-Heywood - Computer networks, 2011 - Elsevier
Identifying encrypted application traffic represents an important issue for many network tasks
including quality of service, firewall enforcement and security. Solutions should ideally be …
including quality of service, firewall enforcement and security. Solutions should ideally be …
A QoS-guaranteed intelligent routing mechanism in software-defined networks
W Sun, Z Wang, G Zhang - Computer Networks, 2021 - Elsevier
With the development of the Internet of Things (IoT), the network is required to guarantee the
differential Quality of Service (QoS) requirements of the various data flows of various IoT …
differential Quality of Service (QoS) requirements of the various data flows of various IoT …