" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security

C Wang, H Zhu - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
The so-called behavioral anomaly detection (BAD) is expected to solve effectively a variety
of security issues by detecting the deviances from normal behavioral patterns of protected …

Rosetta: Enabling robust tls encrypted traffic classification in diverse network environments with tcp-aware traffic augmentation

R Xie, Y Wang, J Cao, E Dong, M Xu, K Sun… - Proceedings of the …, 2023 - dl.acm.org
As the majority of Internet traffic is encrypted by the Transport Layer Security (TLS) protocol,
recent advances leverage Deep Learning (DL) models to conduct encrypted traffic …

Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features

Y Hong, Q Li, Y Yang, M Shen - Information Sciences, 2023 - Elsevier
At present, the TLS cryptographic protocol is widely deployed. While protecting the security
and integrity of transmitted information, it also makes the detection of malicious behavior …

Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side

R Xie, J Cao, Y Zhu, Y Zhang, Y He… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
As the mainstream encrypted protocols adopt TCP protocol to ensure lossless data
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …

IoT Bricks Over v6: Understanding IPv6 Usage in Smart Homes

T Hu, DJ Dubois, D Choffnes - Proceedings of the 2024 ACM on Internet …, 2024 - dl.acm.org
Recent years have seen growing interest and support for IPv6 in residential networks. While
nearly all modern networking devices and operating systems support IPv6, it remains …

Understanding Web Fingerprinting with a Protocol-Centric Approach

B Cebere, C Rossow - Proceedings of the 27th International Symposium …, 2024 - dl.acm.org
Recent breakthroughs in machine learning (ML) have unleashed several approaches to
fingerprinting web traffic based on traffic analysis. In particular, researchers report …

FusionTC: Encrypted App Traffic Classification Using Decision‐Level Multimodal Fusion Learning of Flow Sequence

S Li, Y Huang, T Gao, L Yang, Y Chen… - Wireless …, 2023 - Wiley Online Library
In recent years, an increasing number of mobile platforms and applications have adopted
traffic encryption protocol technology to ensure privacy and security. Existing researches on …

AppFineGraph: Hierarchical Mobile Encrypted Traffic Classification at Multi-Granularities via a Branch Graph Neural Network

S Li, Z Lv, T Zang, L Yang… - 2024 International Joint …, 2024 - ieeexplore.ieee.org
Most of existing methods for classifying mobile encrypted traffic are primarily designed for
coarse-grained scenarios, focusing on classification at the app name level. This implies that …

FineNet: Few-Shot Mobile Encrypted Traffic Classification via a Deep Triplet Learning Network Based on Transformer

S Li, Q Qiang, T Zang, L Yang… - 2024 IEEE Wireless …, 2024 - ieeexplore.ieee.org
The existing encrypted mobile traffic classification methods often require a large number of
training sets to ensure the effect of the model. When it is difficult to collect enough samples …