Identification of encrypted traffic through attention mechanism based long short term memory

H Yao, C Liu, P Zhang, S Wu… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Network traffic classification has become an important part of network management, which is
beneficial for achieving intelligent network operation and maintenance, enhancing the …

Intelligently modeling, detecting, and scheduling elephant flows in software defined energy cloud: A survey

LX Liao, HC Chao, MY Chen - Journal of Parallel and Distributed …, 2020 - Elsevier
Elephant flows (elephants) refer to the sequences of packets that contribute only 10% of the
total volume but consume over 90% of the network bandwidth. They often cause network …

GRAIN: Granular multi-label encrypted traffic classification using classifier chain

F Zaki, F Afifi, S Abd Razak, A Gani, NB Anuar - Computer Networks, 2022 - Elsevier
Granular traffic classification categorizes traffic into detailed classes like application names
and services. Application names represent parent applications, such as Facebook, while …

A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage

VC Cunha, AZ Zavala, D Magoni, PRM Inacio… - IEEE …, 2022 - ieeexplore.ieee.org
Internet traffic classification aims to identify the kind of Internet traffic. With the rise of traffic
encryption and multi-layer data encapsulation, some classic classification methods have lost …

Scalable architecture for SDN traffic classification

M Hayes, B Ng, A Pekar, WKG Seah - IEEE Systems Journal, 2017 - ieeexplore.ieee.org
Scalable network-wide traffic classification (TC), combined with knowledge of endpoint
identities, will enable the next wave of innovation in networking, by exposing a valuable …

Know your big data trade-offs when classifying encrypted mobile traffic with deep learning

G Aceto, D Ciuonzo, A Montieri… - 2019 Network traffic …, 2019 - ieeexplore.ieee.org
The spread of handheld devices has led to the unprecedented growth of traffic volumes
traversing both local networks and the Internet, appointing mobile traffic classification as a …

A big data-enabled hierarchical framework for traffic classification

G Bovenzi, G Aceto, D Ciuonzo… - … on Network Science …, 2020 - ieeexplore.ieee.org
According to the critical requirements of the Internet, a wide range of privacy-preserving
technologies are available, eg proxy sites, virtual private networks, and anonymity tools …

Streaming traffic classification: a hybrid deep learning and big data approach

M Seydali, F Khunjush, J Dogani - Cluster Computing, 2024 - Springer
Massive amounts of real-time streaming network data are generated quickly because of the
exponential growth of applications. Analyzing patterns in generated flow traffic streaming …

Pattern discovery in internet background radiation

F Iglesias, T Zseby - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Internet Background Radiation (IBR) is observed in empty network address spaces. No
traffic should arrive there, but it does in overwhelming quantities, gathering evidences of …

[PDF][PDF] Ladon: a cyber-threat bio-inspired intelligence management system

K Demertzis, L Iliadis - Journal of Applied Mathematics & …, 2016 - academia.edu
According to the Greek mythology, Ladon was the huge dragon with the 100 heads, which
had the ability to stay continuously up, in order to guard the golden “Esperides” apples in the …