Results 1 to 10 of about 3,911,620 (341)

A Comparative Study of Traffic Classification Techniques for Smart City Networks [PDF]

open access: yesSensors, 2021
Smart city networks involve many applications that impose specific Quality of Service (QoS) requirements, thus representing a challenging scenario for network management.
Razan M. AlZoman, Mohammed J. F. Alenazi
doaj   +3 more sources

Explainable Internet Traffic Classification [PDF]

open access: yesApplied Sciences, 2021
The problem analyzed in this paper deals with the classification of Internet traffic. During the last years, this problem has experienced a new hype, as classification of Internet traffic has become essential to perform advanced network management.
Christian Callegari   +3 more
doaj   +5 more sources

Software defined networking based network traffic classification using machine learning techniques. [PDF]

open access: yesSci Rep
The classification of network traffic has become increasingly crucial due to the rapid growth in the number of internet users. Conventional approaches, such as identifying traffic based on port numbers and payload inspection are becoming ineffective due ...
Salau AO, Beyene MM.
europepmc   +2 more sources

Procedures, Criteria, and Machine Learning Techniques for Network Traffic Classification: A Survey

open access: yesIEEE Access, 2022
Traffic classification is considered an important research area due to the increasing demand in network users. It not only effectively improve the network service identifications and security issues of the traffic network, but also provide robust ...
Muhammad Sameer Sheikh, Yinqiao Peng
doaj   +2 more sources

Robot Communication: Network Traffic Classification Based on Deep Neural Network [PDF]

open access: yesFrontiers in Neurorobotics, 2021
With the rapid popularization of robots, the risks brought by robot communication have also attracted the attention of researchers. Because current traffic classification methods based on plaintext cannot classify encrypted traffic, other methods based ...
Mengmeng Ge, Xiangzhan Yu, Likun Liu
doaj   +2 more sources

Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis [PDF]

open access: yesSensors
The widespread use of encrypted traffic poses challenges to network management and network security. Traditional machine learning-based methods for encrypted traffic classification no longer meet the demands of management and security. The application of
Guanyu Wang, Yijun Gu
doaj   +2 more sources

Few-shot traffic classification based on autoencoder and deep graph convolutional networks [PDF]

open access: yesScientific Reports
Traffic classification is a crucial technique in network management that aims to identify and manage data packets to optimize network efficiency, ensure quality of service, enhance network security, and implement policy management. As graph convolutional
Shengwei Xu   +4 more
doaj   +2 more sources

ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification [PDF]

open access: yesThe Web Conference, 2022
Encrypted traffic classification requires discriminative and robust traffic representation captured from content-invisible and imbalanced traffic data for accurate classification, which is challenging but indispensable to achieve network security and ...
Xinjie Lin   +5 more
semanticscholar   +1 more source

TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification [PDF]

open access: yesThe Web Conference, 2023
Encrypted traffic classification is receiving widespread attention from researchers and industrial companies. However, the existing methods only extract flow-level features, failing to handle short flows because of unreliable statistical properties, or ...
Haozhen Zhang   +6 more
semanticscholar   +1 more source

Anonymous traffic classification based on three-dimensional Markov image and deep learning [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2023
Illegal elements use the characteristics of an anonymous network hidden service mechanism to build a dark network and conduct various illegal activities, which brings a serious challenge to network security.
Xin Tang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy