2021
DOI: 10.1016/j.comnet.2021.108472
|View full text |Cite
|
Sign up to set email alerts
|

MATEC: A lightweight neural network for online encrypted traffic classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(21 citation statements)
references
References 23 publications
0
21
0
Order By: Relevance
“…It allows AB-RF to achieve low training time and high prediction throughput. Simultaneously, AB-RF outperforms the best known from the literature classifiers, namely, BGRUA [10] and MATEC [11] in classification quality. • We introduce the recomposition algorithm for TLS Hello messages to place TLS parameters on the same positions for different handshakes.…”
Section: Introductionmentioning
confidence: 85%
See 2 more Smart Citations
“…It allows AB-RF to achieve low training time and high prediction throughput. Simultaneously, AB-RF outperforms the best known from the literature classifiers, namely, BGRUA [10] and MATEC [11] in classification quality. • We introduce the recomposition algorithm for TLS Hello messages to place TLS parameters on the same positions for different handshakes.…”
Section: Introductionmentioning
confidence: 85%
“…Obviously, ECH prevents SNI-based classification. However, many studies show that Neural Network (NN) algorithms that analyze TLS handshake payload bytes provide QoS-aware classification even with hidden SNI [10], [11]. In Section III-D, we discuss them in more details.…”
Section: ) Qos Provisioningmentioning
confidence: 99%
See 1 more Smart Citation
“…Guo et al [5] propose two deep learningbased models for VPN traffic detection and VPN traffic classification, i.e., convolutional auto-encoding (CAE) and convolutional neural network (CNN). Cheng et al [6] design a lightweight model for online encrypted traffic classification. The number of parameters and training time of the model are significantly reduced.…”
Section: Related Workmentioning
confidence: 99%
“…However, these methods have a common drawback, i.e., large-sized converted images. For example, many methods (e.g., [5][6][7][8]) convert the payloads of the first few packets of a flow into an image. They connect the payloads of the first few packets of a flow into a byte stream, and then convert a byte into an integer (0 to 255).…”
Section: Introductionmentioning
confidence: 99%