Deep learning and pre-training technology for encrypted traffic classification: A comprehensive review
Network traffic classification has long been a pivotal topic in network security. In the past two
decades, methods like port-based classification, deep packet inspection, and machine …
decades, methods like port-based classification, deep packet inspection, and machine …
Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks
M Jiang, Z Li, P Fu, W Cai, M Cui, G Xiong, G Gou - Computer Networks, 2022 - Elsevier
Identifying mobile applications (apps) from encrypted network traffic (also known as app
fingerprinting) plays an important role in areas like network management, advertising …
fingerprinting) plays an important role in areas like network management, advertising …
BoAu: Malicious traffic detection with noise labels based on boundary augmentation
Q Yuan, C Liu, W Yu, Y Zhu, G Xiong, Y Wang… - Computers & Security, 2023 - Elsevier
The effectiveness of deep-learning-based malicious traffic detection systems relies on high-
quality labeled traffic datasets. However, malicious traffic labeling approaches can easily …
quality labeled traffic datasets. However, malicious traffic labeling approaches can easily …
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm
The continuous emergence of malware has threatened to the Android platform and user
privacy. With the evolution of the Android system and malware, it is challenging to design a …
privacy. With the evolution of the Android system and malware, it is challenging to design a …
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification
Network traffic classification plays a crucial role in both network management and
monitoring. Recently, an increasing number of Decentralized Applications (DApps) are …
monitoring. Recently, an increasing number of Decentralized Applications (DApps) are …
CETP: A novel semi-supervised framework based on contrastive pre-training for imbalanced encrypted traffic classification
Encrypted traffic classification (ETC) requires differentiated and robust traffic representation
captured from content-agnostic and imbalanced traffic data for accurate classification, which …
captured from content-agnostic and imbalanced traffic data for accurate classification, which …
IIT: Accurate Decentralized Application Identification Through Mining Intra-and Inter-Flow Relationships
Q Meng, Q Yuan, W Niu, Y Wang, S Lu… - … on Network and …, 2024 - ieeexplore.ieee.org
Identifying Decentralized Applications (DApps) from encrypted network traffic plays an
important role in areas such as network management and threat detection. However, DApps …
important role in areas such as network management and threat detection. However, DApps …
gShock: A GNN-based Fingerprinting System for Permissioned Blockchain Networks over Encrypted Channels
Blockchain technology has ushered in a transformative paradigm of decentralized and
transparent systems, offering innovative solutions across diverse sectors. While these …
transparent systems, offering innovative solutions across diverse sectors. While these …
Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
IS Jung, YR Song, LA Jilcha, DH Kim, SY Im, SW Shim… - Symmetry, 2024 - mdpi.com
With the continuously growing requirement for encryption in network environments, web
browsers are increasingly employing hypertext transfer protocol security. Despite the …
browsers are increasingly employing hypertext transfer protocol security. Despite the …
Unknown Traffic Recognition Based on Multi-Feature Fusion and Incremental Learning
J Liu, J Wang, T Yan, F Qi, G Chen - Applied Sciences, 2023 - mdpi.com
Accurate classification and identification of Internet traffic are crucial for maintaining network
security. However, unknown network traffic in the real world can affect the accuracy of …
security. However, unknown network traffic in the real world can affect the accuracy of …