Deep learning and pre-training technology for encrypted traffic classification: A comprehensive review

W Dong, J Yu, X Lin, G Gou, G Xiong - Neurocomputing, 2024 - Elsevier
Network traffic classification has long been a pivotal topic in network security. In the past two
decades, methods like port-based classification, deep packet inspection, and machine …

Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks

M Jiang, Z Li, P Fu, W Cai, M Cui, G Xiong, G Gou - Computer Networks, 2022 - Elsevier
Identifying mobile applications (apps) from encrypted network traffic (also known as app
fingerprinting) plays an important role in areas like network management, advertising …

BoAu: Malicious traffic detection with noise labels based on boundary augmentation

Q Yuan, C Liu, W Yu, Y Zhu, G Xiong, Y Wang… - Computers & Security, 2023 - Elsevier
The effectiveness of deep-learning-based malicious traffic detection systems relies on high-
quality labeled traffic datasets. However, malicious traffic labeling approaches can easily …

metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm

Z Li, Z Zhao, R Zhang, H Lu, W Li, F Zhang, S Lu… - Computer Networks, 2024 - Elsevier
The continuous emergence of malware has threatened to the Android platform and user
privacy. With the evolution of the Android system and malware, it is challenging to design a …

CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

X Zhou, X Xiao, Q Li, B Zhang, G Hu, X Luo… - Proceedings of the 19th …, 2024 - dl.acm.org
Network traffic classification plays a crucial role in both network management and
monitoring. Recently, an increasing number of Decentralized Applications (DApps) are …

CETP: A novel semi-supervised framework based on contrastive pre-training for imbalanced encrypted traffic classification

X Lin, L He, G Gou, J Yu, Z Guan, X Li, J Guo… - Computers & …, 2024 - Elsevier
Encrypted traffic classification (ETC) requires differentiated and robust traffic representation
captured from content-agnostic and imbalanced traffic data for accurate classification, which …

IIT: Accurate Decentralized Application Identification Through Mining Intra-and Inter-Flow Relationships

Q Meng, Q Yuan, W Niu, Y Wang, S Lu… - … on Network and …, 2024 - ieeexplore.ieee.org
Identifying Decentralized Applications (DApps) from encrypted network traffic plays an
important role in areas such as network management and threat detection. However, DApps …

gShock: A GNN-based Fingerprinting System for Permissioned Blockchain Networks over Encrypted Channels

M Seo, J Kim, M You, S Shin, J Kim - IEEE Access, 2024 - ieeexplore.ieee.org
Blockchain technology has ushered in a transformative paradigm of decentralized and
transparent systems, offering innovative solutions across diverse sectors. While these …

Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction

IS Jung, YR Song, LA Jilcha, DH Kim, SY Im, SW Shim… - Symmetry, 2024 - mdpi.com
With the continuously growing requirement for encryption in network environments, web
browsers are increasingly employing hypertext transfer protocol security. Despite the …

Unknown Traffic Recognition Based on Multi-Feature Fusion and Incremental Learning

J Liu, J Wang, T Yan, F Qi, G Chen - Applied Sciences, 2023 - mdpi.com
Accurate classification and identification of Internet traffic are crucial for maintaining network
security. However, unknown network traffic in the real world can affect the accuracy of …