Background The rapid growth of encrypted network traffic has increased the need for effective and unbiased Network Traffic Classification (NTC). Traditional techniques struggle with encrypted data, limited feature availability, and high traffic volume ...
Ana M. Maitin +3 more
doaj +1 more source
Semi-Supervised Encrypted Malicious Traffic Detection Based on Multimodal Traffic Characteristics
The exponential growth of encrypted network traffic poses significant challenges for detecting malicious activities online. The scale of emerging malicious traffic is significantly smaller than that of normal traffic, and the imbalanced data distribution
Ming Liu +3 more
doaj +1 more source
Software defined networking based network traffic classification using machine learning techniques
The classification of network traffic has become increasingly crucial due to the rapid growth in the number of internet users. Conventional approaches, such as identifying traffic based on port numbers and payload inspection are becoming ineffective due ...
Ayodeji Olalekan Salau +1 more
doaj +1 more source
An encrypted traffic identification method based on multi-scale feature fusion
As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic
Peng Zhu +4 more
doaj +1 more source
Multi-Level Pre-Training for Encrypted Network Traffic Classification
With the recent growth of network environments, the use of encrypted traffic has increased, making traditional methods less effective. Consequently, research on encrypted traffic analysis using Machine Learning (ML) and Deep Learning (DL) techniques has ...
Jee-Tae Park +4 more
doaj +1 more source
Contextual classification of network traffic through rough set theory and convolutional neural networks. [PDF]
Priyanka D, Sundara Krishna YK.
europepmc +1 more source
Enhancing encrypted HTTPS traffic classification based on stacked deep ensembles models. [PDF]
Elshewey AM, Osman AM.
europepmc +1 more source
Privacy protection method for ADS-B air traffic control data based on convolutional neural network and symmetric encryption. [PDF]
Ma C, Jia R, Lou J, Wang M.
europepmc +1 more source
A privacy preserving intrusion detection framework for IIoT in 6G networks using homomorphic encryption and graph neural networks. [PDF]
Hua B, Xi H.
europepmc +1 more source
LSTM guided homomorphic encryption for threat-resistant IoT networks. [PDF]
Kumar S +5 more
europepmc +1 more source

