Results 91 to 100 of about 1,873 (195)

Application of natural language processing techniques to network traffic processing for classification using deep learning models

open access: yesJournal of Big Data
Background The rapid growth of encrypted network traffic has increased the need for effective and unbiased Network Traffic Classification (NTC). Traditional techniques struggle with encrypted data, limited feature availability, and high traffic volume ...
Ana M. Maitin   +3 more
doaj   +1 more source

Semi-Supervised Encrypted Malicious Traffic Detection Based on Multimodal Traffic Characteristics

open access: yesSensors
The exponential growth of encrypted network traffic poses significant challenges for detecting malicious activities online. The scale of emerging malicious traffic is significantly smaller than that of normal traffic, and the imbalanced data distribution
Ming Liu   +3 more
doaj   +1 more source

Software defined networking based network traffic classification using machine learning techniques

open access: yesScientific Reports
The classification of network traffic has become increasingly crucial due to the rapid growth in the number of internet users. Conventional approaches, such as identifying traffic based on port numbers and payload inspection are becoming ineffective due ...
Ayodeji Olalekan Salau   +1 more
doaj   +1 more source

An encrypted traffic identification method based on multi-scale feature fusion

open access: yesArray
As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic
Peng Zhu   +4 more
doaj   +1 more source

Multi-Level Pre-Training for Encrypted Network Traffic Classification

open access: yesIEEE Access
With the recent growth of network environments, the use of encrypted traffic has increased, making traditional methods less effective. Consequently, research on encrypted traffic analysis using Machine Learning (ML) and Deep Learning (DL) techniques has ...
Jee-Tae Park   +4 more
doaj   +1 more source

LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]

open access: yesDiscov Comput
Kumar S   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy