2020
DOI: 10.1109/access.2019.2962106
|View full text |Cite
|
Sign up to set email alerts
|

Semi-Supervised Encrypted Traffic Classification With Deep Convolutional Generative Adversarial Networks

Abstract: Network traffic classification serves as a building block for important tasks such as security and quality of service management. The field has been studied for a long time, with many techniques such as classical machine learning and deep learning methods currently available. However, the emergence of stronger encryption protocols has led to the rise of new challenges. One of the challenges is capturing and labeling a large amount of encrypted traffic data especially for training deep learning classifiers, as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(31 citation statements)
references
References 14 publications
(18 reference statements)
0
31
0
Order By: Relevance
“…As explained previously, our approach differs in the kind of features that we select from the dataset, as we ignore all the header data. Finally, Iliyasu and Deng develop a semisupervised method using Deep Convolutional Generative Adversarial Networks [29]. In general, they achieve lower accuracies on the classification problem relative to other works, however they can work with small labeled datasets.…”
Section: Related Workmentioning
confidence: 99%
“…As explained previously, our approach differs in the kind of features that we select from the dataset, as we ignore all the header data. Finally, Iliyasu and Deng develop a semisupervised method using Deep Convolutional Generative Adversarial Networks [29]. In general, they achieve lower accuracies on the classification problem relative to other works, however they can work with small labeled datasets.…”
Section: Related Workmentioning
confidence: 99%
“…y k is the kth output variable, n o represents the number of output variables. w 1 ij denotes the weight between the ith input neuron and the jth hidden neuron, w 2 jk is the weight between the jth hidden neuron and the kth output neuron. b 1 j and b 2 k are the biases for the neurons in the hidden layer and the output layer, respectively.…”
Section: A Feedforward Neural Network With Linksmentioning
confidence: 99%
“…s 1 ij = 1 represents the two nodes are connected, s 1 ij = 0 represents the two nodes are not connected. s 2 jk is the switch between the jth hidden neuron and the kth output neuron. s 2 ij = 1 means the two nodes are connected, s 2 ij = 0 means the two nodes are not connected.…”
Section: A Feedforward Neural Network With Linksmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper [9] was written by Iliyasu and Deng. They have used TensorFlow keras high-level API 2.0.0-alpha as the deep learning software framework to implement both the semi-supervised DCGAN model, and the baseline models.…”
Section: Semi-supervised Encrypted Traffic Classification With Dcgan (2019)mentioning
confidence: 99%