2021
DOI: 10.1016/j.comnet.2021.107974
|View full text |Cite
|
Sign up to set email alerts
|

TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 92 publications
(52 citation statements)
references
References 19 publications
0
52
0
Order By: Relevance
“…The experimental results are presented in Table 9. It can be seen that the DL-based supervised model such as [37] and [38] outperforms all the approaches and specifically our model because they are more complex. However, this is not the case with the DT-based approach [36], where our model gives better results.…”
Section: Experiments On the Vpn-nonvpn Datasetmentioning
confidence: 94%
“…The experimental results are presented in Table 9. It can be seen that the DL-based supervised model such as [37] and [38] outperforms all the approaches and specifically our model because they are more complex. However, this is not the case with the DT-based approach [36], where our model gives better results.…”
Section: Experiments On the Vpn-nonvpn Datasetmentioning
confidence: 94%
“…(2) statistical feature methods: AppScanner [36], CUMUL [27], BIND [1] and k-fingerprinting (K-fp) [12]; (3) deep learning methods: Deep Fingerprinting (DF) [35], FS-Net [22], GraphDApp [33], TSCRNN [21], Deeppacket [25]; (4) pre-training method: PERT [13]. The experimental results are shown in Tables 2 and 3.…”
Section: Comparison With State-of-the-art Methodsmentioning
confidence: 99%
“…Encrypted traffic classification using supervised deep learning have become a popular approach that automatically extracts discriminative features rather than relying on manual design. DF [35] uses convolutional neural networks (CNNs) and FS-Net [22] uses recurrent neural networks (RNNs) to automatically extract representations from raw packet size sequences of encrypted traffic, while Deeppacket [25] and TSCRNN [21] are characterizing raw payloads. However, this approach relies on a large amount of supervised data to capture valid features thus learning biased representations in imbalanced data, while our model does not rely on large labeled data.…”
Section: Related Work 21 Encrypted Traffic Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…In preprocessing stage, raw traffic information is treated using sampling, vectorization, and flow segmentation, so on. Lin et al [14] proposed permissioned private blockchain based solutions for securing the image when encrypting. In this system, the cryptographic pixel value of images is kept on the blockchain, ensuring the security and privacy of image data.…”
Section: Introductionmentioning
confidence: 99%