2021
DOI: 10.1007/978-981-16-6554-7_92
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted Traffic Identification Method Based on Multi-scale Spatiotemporal Feature Fusion Model with Attention Mechanism

Abstract: With the increasing complexity of encryption protocols in recent years, the existing network traffic identification and classification methods are facing great challenges. Researchers have found that most of the improved methods for deep learning are achieved by increasing the width and depth of the network. However, a large number of parameters need to be calculated in the process of network training, which increase the computational complexity of the algorithm.To address the problems of different important f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…E. Hodo et al [15] used an artificial neural network and a support vector machine for binary classification of the public dataset ISCXTor2016 and achieved satisfactory accuracies. Huo, Y et al [16]. proposed a new classification model.…”
Section: Deep Learning Methodsmentioning
confidence: 99%
“…E. Hodo et al [15] used an artificial neural network and a support vector machine for binary classification of the public dataset ISCXTor2016 and achieved satisfactory accuracies. Huo, Y et al [16]. proposed a new classification model.…”
Section: Deep Learning Methodsmentioning
confidence: 99%
“…Huo et al [16] noted that a large number of parameters need to be calculated to train a network to classify Tor traffic. As calculating these parameters is computationally expensive, they propose a new model that extracts spatial features by CNN layers, gathers temporal features from LSTM layers, then fuses multi-scale features before sending the features to an attention mechanism.…”
Section: B Tor Traffic Detectionmentioning
confidence: 99%