2021
DOI: 10.1109/tnsm.2021.3071441
|View full text |Cite
|
Sign up to set email alerts
|

FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
41
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 96 publications
(42 citation statements)
references
References 34 publications
1
41
0
Order By: Relevance
“…The works that utilize deep-learning span over multiple scopes and domains, with works that focus on the classification of the operating system, browser, and application levels [1]; mobile app identification [2], [3]; and even webpage fingerprinting [4]. Several works converted the network flow into an image to harness image processing techniques and equivalent Deep-Learning (DL) architectures [2], [11], [17], [18], [20], [21]. Newer works incorporated the Ordinary Differential Equation Network (ODENet) within a DL architecture to classify uni-directional network flows [22].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The works that utilize deep-learning span over multiple scopes and domains, with works that focus on the classification of the operating system, browser, and application levels [1]; mobile app identification [2], [3]; and even webpage fingerprinting [4]. Several works converted the network flow into an image to harness image processing techniques and equivalent Deep-Learning (DL) architectures [2], [11], [17], [18], [20], [21]. Newer works incorporated the Ordinary Differential Equation Network (ODENet) within a DL architecture to classify uni-directional network flows [22].…”
Section: Related Workmentioning
confidence: 99%
“…Along with detection or classification methods, the data in use have great importance as well. Some publicly available datasets such as ISCXVPN2016 are widely used in the literature in works such as [11]- [13], [16], [22], [23], [31]. Where the works adopt the dataset for the purpose of classifying a network flow according to its encapsulation type (tunneled via VPN or not), traffic type (e.g., video/audio/chat), and application (e.g., Skype/Netflix).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations