A comprehensive analysis of website fingerprinting defenses on Tor

X Xiao, X Zhou, Z Yang, L Yu, B Zhang, Q Liu… - Computers & Security, 2024 - Elsevier
Website fingerprinting (WF) enables eavesdroppers to identify the website a user is visiting
by network surveillance, even if the traffic is protected by anonymous communication …

TCGNN: Packet-grained network traffic classification via Graph Neural Networks

G Hu, X Xiao, M Shen, B Zhang, X Yan, Y Liu - Engineering Applications of …, 2023 - Elsevier
Network traffic classification is the fundamental and vital function for network management,
network security and so on. With the traffic scenarios becoming more and more complex …

PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics

X Yang, S Ruan, Y Yue, B Sun - Computer Networks, 2024 - Elsevier
Cobalt Strike is the most prevalent attack tool abused by cyber-criminals to achieve
command and control on victim hosts over HTTPS traffics. It appears in many ransomware …

An Adaptive Congestion Control Protocol for Wireless Networks Using Deep Reinforcement Learning

KS Midhula - IEEE Transactions on Network and Service …, 2023 - ieeexplore.ieee.org
Congestion is more prevalent in wireless networks due to the unique challenges and
limitations of the present wireless technology. With the increasing demand for high …

Interaction matters: Encrypted traffic classification via status-based interactive behavior graph

Y Li, X Chen, W Tang, Y Zhu, Z Han, Y Yue - Applied Soft Computing, 2024 - Elsevier
Accurately classifying encrypted traffic is the indispensable cornerstone for network
management and Quality of Service (QoS) improvement. Although existing works that learn …

Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory

Y Han, X Wang, M He, X Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
To ensure the privacy and security of Internet of Things data, encrypted transmission of data
has become a common approach. However, this has also introduced limitations for the …

[HTML][HTML] Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction

IS Jung, YR Song, LA Jilcha, DH Kim, SY Im, SW Shim… - Symmetry, 2024 - mdpi.com
With the continuously growing requirement for encryption in network environments, web
browsers are increasingly employing hypertext transfer protocol security. Despite the …

[HTML][HTML] Taxi origin and destination demand prediction based on deep learning: a review

D Peng, M Huang, Z Xing - Digital Transportation and Safety, 2023 - maxapress.com
Taxi demand prediction is a crucial component of intelligent transportation system research.
Compared to region-based demand prediction, origin-destination (OD) demand prediction …

Statistical Analysis of Urban Traffic Flow Using Deep Learning

Q Liu, S Wu, P Zhang - Informatica, 2024 - informatica.si
In recent years, urbanization has brought about challenges such as population growth,
increased demand for traffic, and traffic congestion. To address the need for accurate traffic …

An Investigation into the Effectiveness of DNS-Based Authentication for Wireless Networks

A Katyal, R Pandian, R Sharma… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
the security of Wi-Fi networks is turning into an increasing number, significant with the
growth of Wi-Fi technology. To prevent malicious entities from connecting to the network …