[HTML][HTML] Large language models meet next-generation networking technologies: A review

CN Hang, PD Yu, R Morabito, CW Tan - Future Internet, 2024 - mdpi.com
The evolution of network technologies has significantly transformed global communication,
information sharing, and connectivity. Traditional networks, relying on static configurations …

Rethinking data-driven networking with foundation models: challenges and opportunities

F Le, M Srivatsa, R Ganti, V Sekar - … of the 21st ACM Workshop on Hot …, 2022 - dl.acm.org
Foundational models have caused a paradigm shift in the way artificial intelligence (AI)
systems are built. They have had a major impact in natural language processing (NLP), and …

Robust and Lightweight Modeling of IoT Network Behaviors From Raw Traffic Packets

A Pasquini, R Vasa, I Logothetis… - … Machine Learning in …, 2024 - ieeexplore.ieee.org
Machine Learning (ML)-based techniques are increasingly used for network management
tasks, such as intrusion detection, application identification, or asset management. Recent …

Application of Tabular Transformer Architectures for Operating System Fingerprinting

R Pérez-Jove, CR Munteanu, A Pazos… - arxiv preprint arxiv …, 2025 - arxiv.org
Operating System (OS) fingerprinting is essential for network management and
cybersecurity, enabling accurate device identification based on network traffic analysis …

A Survey on Large Language Models for Network Operations & Management: Applications, Techniques, and Opportunities

F Liu, B Farkiani, P Crowley - Authorea Preprints, 2024 - techrxiv.org
This survey paper provides an extensive review of the application of Large Language
Models (LLMs) in network operations and management (NO&M). It outlines the …

Using of NLP Methods to Separate Traffic Packets of Different Protocols

Z Rusinova, Y Chernyshov - 2023 IEEE Ural-Siberian …, 2023 - ieeexplore.ieee.org
Trace analysis is a protocol reverse engineering technique that aims to determine the
behavior of unknown network protocols by examining network messages. One of the …

防护性 DNS 服务关键技术研究综述

马永征, **洪涛, 马中胜, 胡卫宏… - 网络与信息安全 …, 2024 - infocomm-journal.com
域名系统(domain name system, DNS) 作为互联网资源的名字标识服务, 提供了从域名到IP
地址的查询转换功能, 是用户访问互联网应用的入口, 也是用户侧安全威胁感知与防御的关键点 …

Development and Research of Methods for Detecting Distorted Data Using a Multimodal Approach

AV Kuznetsov, EA Markina - 2024 X International Conference …, 2024 - ieeexplore.ieee.org
The paper considers the problem of detecting distorted data using a multimodal approach.
Various methods of classification are being investigated. In the course of experimental …

[PDF][PDF] Towards TabTransformer-based Operating System Fingerprinting: A Preliminary Approach using the Nmap Database

R Pérez Jove, A Pazos, J Vázquez Naya - 2024 - idus.us.es
This work explores TabTransformers for operating system fingerprinting, leveraging their
ability to learn relationships within data to make classification based on network traffic …

Using of Transformer-Based Language Models to Separate Traffic Packets of Different Protocols

Z Rusinova, Y Chernyshov - 2023 XVIII International …, 2023 - ieeexplore.ieee.org
Recognition of network protocols is one of the most important steps in the intelligent
algorithms for detecting incidents and anomalies in information security systems. In cases …