Results 21 to 30 of about 1,873 (195)

Robot Communication: Network Traffic Classification Based on Deep Neural Network

open access: yesFrontiers in Neurorobotics, 2021
With the rapid popularization of robots, the risks brought by robot communication have also attracted the attention of researchers. Because current traffic classification methods based on plaintext cannot classify encrypted traffic, other methods based ...
Mengmeng Ge, Xiangzhan Yu, Likun Liu
doaj   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Encrypted Traffic Classification of CNN and BiGRU Based on Self-attention [PDF]

open access: yesJisuanji kexue
To address the problems of low accuracy of traditional encrypted traffic classification methods,the use of traffic load will violate user privacy and weak generalization ability,an encrypted traffic classification method of CNN and BiGRU based on self ...
CHEN Siyu, MA Hailong, ZHANG Jianhui
doaj   +1 more source

Is Encrypted ClientHello a Challenge for Traffic Classification?

open access: yesIEEE Access, 2022
Although the widely-used Transport Layer Security (TLS) protocol hides application data, an unencrypted part of the TLS handshake, specifically the server name indication (SNI), is a backdoor for encrypted traffic classification frameworks.
Danil Shamsimukhametov   +3 more
doaj   +1 more source

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Study on SSL/TLS Encrypted Malicious Traffic Detection Algorithm Based on Graph Neural Networks [PDF]

open access: yesJisuanji kexue
In order to achieve precise detection of SSL/TLS encrypted malicious traffic,a graph neural network-based model for malicious encrypted traffic detection is proposed,to address the issue of excessive reliance on expert experience in traditional machine ...
TANG Ying, WANG Baohui
doaj   +1 more source

Real-Time Encrypted Traffic Classification with Deep Learning

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2022
Confidentiality requirements of individuals and companies led to the dominance of encrypted payloads in the overall Internet traffic. Hence, traffic classification on a network became increasingly difficult as it must rely on only the packet headers ...
Onur Demir, Deniz Tuana Ergönül
doaj   +1 more source

Classification of encrypted traffic using deep learning

open access: yes, 2023
International Journal of Computer Science and Information Technology Research, ISSN 2348-1196 (print), ISSN 2348-120X (online), Research Publish Journals, Website: www.researchpublish ...
Kausar Mia   +7 more
openaire   +1 more source

An Improved DoH Traffic Classification Method for XGboost

open access: yesJournal of Harbin University of Science and Technology, 2023
Encrypted traffic has become the main traffic in the Internet, and its classification has always been one of the research hotspots.Aiming at the problems of accurate identification of DoH(DNS-over-HTTPS) traffic in the current network, slow processing
LI Bo   +3 more
doaj   +1 more source

Malicious Traffic Detection Combining Features of Packet Payload and Stream Fingerprint [PDF]

open access: yesJisuanji gongcheng, 2020
The data sets for the detection of malicious traffic by the SSL/TLS protocol are single-sourced.Traditional detection methods take the quintuple feature of network traffic as the main feature for classification,which reduces the accuracy of malicious ...
HU Bin, ZHOU Zhihong, YAO Lihong, LI Jianhua
doaj   +1 more source

Home - About - Disclaimer - Privacy