2023
DOI: 10.1609/aaai.v37i4.25674
|View full text |Cite
|
Sign up to set email alerts
|

Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation

Abstract: Traffic classification is a critical task in network security and management. Recent research has demonstrated the effectiveness of the deep learning-based traffic classification method. However, the following limitations remain: (1) the traffic representation is simply generated from raw packet bytes, resulting in the absence of important information; (2) the model structure of directly applying deep learning algorithms does not take traffic characteristics into account; and (3) scenario-specific classifier t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…To solve these limitations, learning-based methods using machine learning and deep learning are the most active, and recently, methods using transformer models have also been performed. Third, in terms of classification level, it consists of the following First, in terms of research areas, it consists of various subfields, including application classification [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26], malicious traffic detection [29][30][31][32], user behavior profiling [27][28][29][30], and web fingerprinting [44][45][46], of which application classification and malicious traffic detection are the most widely studied. Second, in terms of methodologies, methods such as port-based and payload-based methods have traditionally been widely used.…”
Section: Overview Of the Network Traffic Classificationmentioning
confidence: 99%
See 4 more Smart Citations
“…To solve these limitations, learning-based methods using machine learning and deep learning are the most active, and recently, methods using transformer models have also been performed. Third, in terms of classification level, it consists of the following First, in terms of research areas, it consists of various subfields, including application classification [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26], malicious traffic detection [29][30][31][32], user behavior profiling [27][28][29][30], and web fingerprinting [44][45][46], of which application classification and malicious traffic detection are the most widely studied. Second, in terms of methodologies, methods such as port-based and payload-based methods have traditionally been widely used.…”
Section: Overview Of the Network Traffic Classificationmentioning
confidence: 99%
“…However, traditional traffic analysis methods are ineffective because many modern applications, including mobile, cloud, and IoT, rely primarily on encrypted traffic. To address the limitations of traditional methods, recent research has turned to learning-based approaches involving ML and DL [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25].…”
Section: Encrypted Traffic Classificationmentioning
confidence: 99%
See 3 more Smart Citations