Generative deep learning for Internet of Things network traffic generation

MR Shahid, G Blanc, H Jmila, Z Zhang… - 2020 IEEE 25th Pacific …, 2020 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) has prompted a recent interest into
realistic IoT network traffic generation. Security practitioners need IoT network traffic data to …

Clustering of unknown protocol messages based on format comparison

F Sun, S Wang, C Zhang, H Zhang - Computer Networks, 2020 - Elsevier
As a solution to detect and analyse unknown or proprietary protocols, Protocol Reverse
Engineering (PRE) has been developed swiftly in recent years. In this field, message …

Raregan: Generating samples for rare classes

Z Lin, H Liang, G Fanti, V Sekar - … of the AAAI Conference on Artificial …, 2022 - ojs.aaai.org
We study the problem of learning generative adversarial networks (GANs) for a rare class of
an unlabeled dataset subject to a labeling budget. This problem is motivated from practical …

ResolFuzz: Differential fuzzing of DNS resolvers

J Bushart, C Rossow - European Symposium on Research in Computer …, 2023 - Springer
This paper identifies and analyzes vulnerabilities in the DNS infrastructure, with particular
focus on recursive DNS resolvers. We aim to identify semantic bugs that could lead to …

Illuminating the hidden challenges of data-driven CDNs

TA Benson - Proceedings of the 3rd Workshop on Machine Learning …, 2023 - dl.acm.org
While Data-driven CDNs have the potential to provide unparalleled performance and
availability improvements, they open up an intricate and exciting tapestry of previously un …

Data Sharing with Generative Adversarial Networks: From Theory to Practice

Z Lin - 2022 - search.proquest.com
In today's age of big data, data sharing among companies, customers, and researchers has
become a critical activity that drives advancements across industry and academia. In these …

Deep learning for Internet of Things (IoT) network security

MR Shahid - 2021 - theses.hal.science
The growing Internet of Things (IoT) introduces new security challenges for network activity
monitoring. Most IoT devices are vulnerable because of a lack of security awareness from …

ADFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center Networks

S Schmidt, J Zerwas, W Kellerer - 2023 19th International …, 2023 - ieeexplore.ieee.org
Researchers develo** new architectures and algorithms for data center networks (DCNs)
face the challenge of producing meaningful evaluations of their contributions. Traditional …

[LIBRO][B] Practical Black-Box Analysis for Network Functions and Services

SJ Moon - 2020 - search.proquest.com
Modern networks are exploding with an increasing array of diverse network functions (eg,
network firewalls) and services (eg, public servers). Despite their critical role in our modern …