Flow topology-based graph convolutional network for intrusion detection in label-limited IoT networks

X Deng, J Zhu, X Pei, L Zhang, Z Ling… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Given the distributed nature of the massively connected “Things” in IoT, IoT networks have
been a primary target for cyberattacks. Although machine learning based network intrusion …

GCN‐ETA: High‐Efficiency Encrypted Malicious Traffic Detection

J Zheng, Z Zeng, T Feng - Security and Communication …, 2022 - Wiley Online Library
Encrypted network traffic is the principal foundation of secure network communication, and it
can help ensure the privacy and integrity of confidential information. However, it hides the …

Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies

Z Wang, KW Fok, VLL Thing - arxiv preprint arxiv:2402.14353, 2024 - arxiv.org
The popularity of 5G networks poses a huge challenge for malicious traffic detection
technology. The reason for this is that as the use of 5G technology increases, so does the …

GCN-TC: combining trace graph with statistical features for network traffic classification

J Zheng, D Li - ICC 2019-2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
For machine-learning-based network traffic classification, we usually need large number of
correctly labeled samples (ground truth) for model-training to get high accuracy. However in …

Early identification of peer-to-peer traffic

B Hullár, S Laki, A Gyorgy - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
To manage and monitor their networks in a proper way, network operators are often
interested in identifying the applications generating the traffic traveling through their …

Profiling-by-association: a resilient traffic profiling solution for the internet backbone

M Iliofotou, B Gallagher, T Eliassi-Rad, G **e… - Proceedings of the 6th …, 2010 - dl.acm.org
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and
applications are avoiding detection using traffic obfuscation and encryption. The key …

[HTML][HTML] AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic

J Liu, G Shao, H Rao, X Li, X Huang - Applied Sciences, 2024 - mdpi.com
While encryption enhances data security, it also presents significant challenges for network
traffic analysis, especially in detecting malicious activities. To tackle this challenge, this …

Traffic classification based on graph convolutional network

X Ji, Q Meng - … IEEE International Conference on Advances in …, 2020 - ieeexplore.ieee.org
Traffic classification is the first step of network QoS control mechanism and traffic anomaly
detection and is an important research branch of congestion control and network security. In …

Efficient methods for early protocol identification

B Hullár, S Laki, A György - IEEE Journal on Selected Areas in …, 2014 - ieeexplore.ieee.org
To manage and monitor their networks in a proper way, network operators are often
interested in automatic methods that enable them to identify applications generating the …

Discriminating graphs through spectral projections

D Fay, H Haddadi, S Uhlig, L Kilmartin, AW Moore… - Computer Networks, 2011 - Elsevier
This paper proposes a novel non-parametric technique for clustering networks based on
their structure. Many topological measures have been introduced in the literature to …