Flow topology-based graph convolutional network for intrusion detection in label-limited IoT networks
Given the distributed nature of the massively connected “Things” in IoT, IoT networks have
been a primary target for cyberattacks. Although machine learning based network intrusion …
been a primary target for cyberattacks. Although machine learning based network intrusion …
GCN‐ETA: High‐Efficiency Encrypted Malicious Traffic Detection
J Zheng, Z Zeng, T Feng - Security and Communication …, 2022 - Wiley Online Library
Encrypted network traffic is the principal foundation of secure network communication, and it
can help ensure the privacy and integrity of confidential information. However, it hides the …
can help ensure the privacy and integrity of confidential information. However, it hides the …
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies
The popularity of 5G networks poses a huge challenge for malicious traffic detection
technology. The reason for this is that as the use of 5G technology increases, so does the …
technology. The reason for this is that as the use of 5G technology increases, so does the …
GCN-TC: combining trace graph with statistical features for network traffic classification
For machine-learning-based network traffic classification, we usually need large number of
correctly labeled samples (ground truth) for model-training to get high accuracy. However in …
correctly labeled samples (ground truth) for model-training to get high accuracy. However in …
Early identification of peer-to-peer traffic
To manage and monitor their networks in a proper way, network operators are often
interested in identifying the applications generating the traffic traveling through their …
interested in identifying the applications generating the traffic traveling through their …
Profiling-by-association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and
applications are avoiding detection using traffic obfuscation and encryption. The key …
applications are avoiding detection using traffic obfuscation and encryption. The key …
[HTML][HTML] AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic
J Liu, G Shao, H Rao, X Li, X Huang - Applied Sciences, 2024 - mdpi.com
While encryption enhances data security, it also presents significant challenges for network
traffic analysis, especially in detecting malicious activities. To tackle this challenge, this …
traffic analysis, especially in detecting malicious activities. To tackle this challenge, this …
Traffic classification based on graph convolutional network
X Ji, Q Meng - … IEEE International Conference on Advances in …, 2020 - ieeexplore.ieee.org
Traffic classification is the first step of network QoS control mechanism and traffic anomaly
detection and is an important research branch of congestion control and network security. In …
detection and is an important research branch of congestion control and network security. In …
Efficient methods for early protocol identification
To manage and monitor their networks in a proper way, network operators are often
interested in automatic methods that enable them to identify applications generating the …
interested in automatic methods that enable them to identify applications generating the …
Discriminating graphs through spectral projections
This paper proposes a novel non-parametric technique for clustering networks based on
their structure. Many topological measures have been introduced in the literature to …
their structure. Many topological measures have been introduced in the literature to …