2023
DOI: 10.21203/rs.3.rs-2495959/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Identification of Encrypted and Malicious Network Traffic Based on One-Dimensional Convolutional Neural Network

Abstract: The rapid development of the internet has brought a significant increase in network traffic, but the efficiency of categorizing different types of network traffic has lagged behind, which has downgraded cyber security. How to identify different dimensions of network traffic data with more efficiency and accuracy remains a challenging issue. We design a convolutional neural network model HexCNN-1D that combines normalized processing and attention mechanisms. By adding the attention mechanism modules Global Atte… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Significant efforts have been explored in utilizing traditional ML algorithms to better understand and secure VPN traffic. For instance, Logistic Regression, Support Vector Machine (SVM), and Naive Bayes have been widely used for their ability to classify and predict outcomes based on historical data, which is crucial for identifying anomalous patterns that may indicate security breaches (Zhou, Y. et al 2023), (Bagui, S. et al2017). Furthermore, the k-Nearest Neighbors (kNN) algorithm has been applied for its simplicity and effectiveness in classification tasks by comparing new data points with known data points (Bagui, S. et al 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Significant efforts have been explored in utilizing traditional ML algorithms to better understand and secure VPN traffic. For instance, Logistic Regression, Support Vector Machine (SVM), and Naive Bayes have been widely used for their ability to classify and predict outcomes based on historical data, which is crucial for identifying anomalous patterns that may indicate security breaches (Zhou, Y. et al 2023), (Bagui, S. et al2017). Furthermore, the k-Nearest Neighbors (kNN) algorithm has been applied for its simplicity and effectiveness in classification tasks by comparing new data points with known data points (Bagui, S. et al 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Encrypted traffic analysis has become more sophisticated with the application of deep learning models. Works by Zhou et al (2023) introduce one-dimensional convolutional neural networks for efficient and accurate traffic classification. Research by Naas and Fesl (2023) introduced a novel dataset for VPN traffic analysis, which could significantly aid in the development of ML models tailored for VPN security.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations