DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification

X Han, G Xu, M Zhang, Z Yang, Z Yu, W Huang… - Computer Networks, 2024 - Elsevier
Nowadays, most network traffic is encrypted, which protects user privacy but complicates the
task of analyzing and classifying encrypted traffic. Identifying the specific categories of …

Detecting anomalies in encrypted traffic via deep dictionary learning

J **ng, C Wu - IEEE INFOCOM 2020-IEEE Conference on …, 2020 - ieeexplore.ieee.org
The widely used encryption of network traffic poses a great challenge to anomaly detection.
Currently, the supervised and semi-supervised solutions suffer from the problems of noisy …

Encrypted malicious traffic detection based on ensemble learning

F **ao, F Yang, S Chen, J Yang - … , CSS 2021, Virtual Event, November 9 …, 2022 - Springer
Nowadays, network traffic detection plays a very important role in protecting cyberspace
security, and more and more applications realize data privacy protection through encryption …

Online and automatic identification of encryption network behaviors in big data environment

Z Hejun, Z Liehuang - Concurrency and Computation: Practice …, 2019 - Wiley Online Library
To handle the difficulty in identifying encrypted network traffic in big data environment, a fast
and online identification method for encryption network behaviors was proposed. Twitter …

Encrypted Malicious Traffic Detection

F **ao¹, F Yang, S Chen, J Yang - Cyberspace Safety and …, 2022 - books.google.com
Nowadays, network traffic detection plays a very important role in protecting cyberspace
security, and more and more applications realize data privacy protection through encryption …

[PDF][PDF] 基于子空间聚类的网络流量分类方法

**丹丹, 田春伟, **佰洋, 孙广路, 康健 - 哈尔滨理工大学学报, 2015 - researchgate.net
应用层网络流量分类技术对流量控制与管理等研究具有重要意义. 针对传统的基于有监督机器
学**的分类方法对所有应用程序使用相同的特征, 使得某些特征对一种或几种应用类型有区分性 …

Classificação de tráfego distribuída: construindo uma arquitetura baseada em redes virtualizadas

PG LOPES JÚNIOR - 2017 - bdtd.ibict.br
Prover um gerenciamento eficiente de uma rede é uma tarefa intimamente ligada ao
conhecimento sobre as informações que compõem o tráfego da rede. Tradicionalmente, um …

Avaliação e otimização de sistemas DPI com base em DFA e priorização de assinaturas

WDB Melo - 2014 - bdtd.ibict.br
Identificação e caracterização de tráfego são atividades relevantes no campo de gerência
de redes. Objetivando uma melhor administração dos recursos disponíveis, gestores de …