2021
DOI: 10.48550/arxiv.2110.09726
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

CGNN: Traffic Classification with Graph Neural Network

Abstract: Traffic classification associates packet streams with known application labels, which is vital for network security and network management. With the rise of NAT, port dynamics, and encrypted traffic, it is increasingly challenging to obtain unified traffic features for accurate classification. Many state-of-the-art traffic classifiers automatically extract features from the packet stream based on deep learning models such as convolution networks. Unfortunately, the compositional and causal relationships betwee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 21 publications
(39 reference statements)
0
3
0
Order By: Relevance
“…In earlier algorithms, the features most commonly used in ETA were the IP, port, and packet length, which can be obtained from packet headers and payloads [7][8][9][10][12][13][14]17,20]. Various learning algorithms, such as ML, CNNs, and GNNs, have been used in ETA and have achieved excellent performance.…”
Section: Encrypted Network Trafficmentioning
confidence: 99%
See 2 more Smart Citations
“…In earlier algorithms, the features most commonly used in ETA were the IP, port, and packet length, which can be obtained from packet headers and payloads [7][8][9][10][12][13][14]17,20]. Various learning algorithms, such as ML, CNNs, and GNNs, have been used in ETA and have achieved excellent performance.…”
Section: Encrypted Network Trafficmentioning
confidence: 99%
“…Further, when using GNN, they can represent and analyze the interrelationships between network traffic types, demonstrating excellent performance. Studies on the utilization of GNNs for the classification of encrypted network traffic are underway [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23]. Moreover, continuous research is expected to be conducted using feature selection and detailed model settings owing to automated learning and high performance.…”
Section: Proposed Architecturementioning
confidence: 99%
See 1 more Smart Citation