Senet-i: An approach for detecting network intrusions through serialized network traffic images

YA Farrukh, S Wali, I Khan, ND Bastian - Engineering Applications of …, 2023 - Elsevier
The exponential growth of the internet and inter-connectivity has resulted in an extensive
increase in network size and the corresponding data, which has led to numerous novel …

Dimensionality reduction for detection of anomalies in the iot traffic data

D Olszewski, M Iwanowski, W Graniszewski - Future Generation Computer …, 2024 - Elsevier
This paper concerns cybersecurity issues in one of the fastest growing fields of modern
computer systems the Internet-of-Things (IoT). In this field, intrusion detection plays a …

Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks

JG Almaraz-Rivera, JA Cantoral-Ceballos, JF Botero - Sensors, 2023 - mdpi.com
The Internet of Things (IoT), projected to exceed 30 billion active device connections
globally by 2025, presents an expansive attack surface. The frequent collection and …

CBS: A Deep Learning Approach for Encrypted Traffic Classification With Mixed Spatio-Temporal and Statistical Features

M Seydali, F Khunjush, B Akbari, J Dogani - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid advancement of the internet and online applications, traffic classification has
become an increasingly significant topic in computer networks. Managing network …

Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks

N Briner, D Cullen, J Halladay, D Miller… - IEEE …, 2023 - ieeexplore.ieee.org
With the meteoric rise in anonymous network traffic data, there is a considerable need for
effective automation in traffic identification tasks. Though many shallow and deep machine …

Cybersecurity and data science

K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …

CNNPRE: A CNN-Based Protocol Reverse Engineering Method

J Garshasbi, M Teimouri - IEEE Access, 2023 - ieeexplore.ieee.org
Given the growth in computer networks and Internet usage, the traditional network
environment has evolved into a more intricate system. Many applications utilize unknown …

Exploring the power of convolutional neural networks for encrypted industrial protocols recognition

E Holasova, P Blazek, R Fujdiak, J Masek… - … Energy, Grids and …, 2024 - Elsevier
The main objective of this paper is to classify unencrypted and encrypted industrial protocols
using deep learning, especially Convolutional Neural Networks. Protocol recognition is …

Sessionvideo: A novel approach for encrypted traffic classification via 3D-CNN model

H Wang, T Xu, J Yang, L Wu… - 2022 23rd Asia-Pacific …, 2022 - ieeexplore.ieee.org
Today encrypted traffic has been used widely on the internet, such as HTTPS and SSH.
Network traffic classification plays an important role in network resource management and …

Comparative Analysis of Classification Methods and Suitable Datasets for Protocol Recognition in Operational Technologies

E Holasova, R Fujdiak, J Misurec - Algorithms, 2024 - mdpi.com
The interconnection of Operational Technology (OT) and Information Technology (IT) has
created new opportunities for remote management, data storage in the cloud, real-time data …