Protocol misidentification made easy with format-transforming encryption

KP Dyer, SE Coull, T Ristenpart… - Proceedings of the 2013 …, 2013 - dl.acm.org
Deep packet inspection (DPI) technologies provide much-needed visibility and control of
network traffic using port-independent protocol identification, where a network flow is …

Ggfast: Automating generation of flexible network traffic classifiers

J Piet, D Nwoji, V Paxson - Proceedings of the ACM SIGCOMM 2023 …, 2023 - dl.acm.org
When employing supervised machine learning to analyze network traffic, the heart of the
task often lies in developing effective features for the ML to leverage. We develop GGFAST …

An effective network traffic classification method with unknown flow detection

J Zhang, C Chen, Y Xiang, W Zhou… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Traffic classification technique is an essential tool for network and system security in the
complex environments such as cloud computing based environment. The state-of-the-art …

Research challenges in nextgen service orchestration

LM Vaquero, F Cuadrado, Y Elkhatib… - Future Generation …, 2019 - Elsevier
Fog/edge computing, function as a service, and programmable infrastructures, like software-
defined networking or network function virtualisation, are becoming ubiquitously used in …

Internet traffic classification demystified: on the sources of the discriminative power

Y Lim, H Kim, J Jeong, C Kim, TT Kwon… - Proceedings of the 6th …, 2010 - dl.acm.org
Recent research on Internet traffic classification has yield a number of data mining
techniques for distinguishing types of traffic, but no systematic analysis on" Why" some …

Realtime classification for encrypted traffic

R Bar-Yanai, M Langberg, D Peleg… - … Symposium, SEA 2010 …, 2010 - Springer
Classifying network flows by their application type is the backbone of many crucial network
monitoring and controlling tasks, including billing, quality of service, security and trend …

Deployment of machine learning and deep learning algorithms in detecting cyberbullying in bangla and romanized bangla text: A comparative study

MT Ahmed, M Rahman, S Nur… - … on Advances in …, 2021 - ieeexplore.ieee.org
Popularity of social media has increased rapidly and now it is very easy to interact with
different persons across social media. As a result, cyberbullying towards people across …

Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world ip networks

TTT Nguyen, G Armitage - Proceedings. 2006 31st IEEE …, 2006 - ieeexplore.ieee.org
Literature on the use of machine learning (ML) algorithms for classifying IP traffic has relied
on full-flows or the first few packets of flows. In contrast, many real-world scenarios require a …

Evolution toward intelligent communications: Impact of deep learning applications on the future of 6G technology

M Abd Elaziz, MAA Al‐qaness, A Dahou… - … : Data Mining and …, 2024 - Wiley Online Library
The sixth generation (6G) represents the next evolution in wireless communication
technology and is currently under research and development. It is expected to deliver faster …

Network traffic classification using k-means clustering

Y Liu, W Li, Y Li - Second international multi-symposiums on …, 2007 - ieeexplore.ieee.org
Network traffic classification and application identification provide important benefits for IP
network engineering, management and control and other key domains. Current popular …