Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

A holistic review of network anomaly detection systems: A comprehensive survey

N Moustafa, J Hu, J Slay - Journal of Network and Computer Applications, 2019 - Elsevier
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …

Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets

M Zeeshan, Q Riaz, MA Bilal, MK Shahzad… - IEEE …, 2021 - ieeexplore.ieee.org
Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a
breakthrough technology. In a nutshell, IoT is the integration of devices and data such that …

A survey of methods for encrypted traffic classification and analysis

P Velan, M Čermák, P Čeleda… - International Journal of …, 2015 - Wiley Online Library
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …

Large-scale mobile app identification using deep learning

S Rezaei, B Kroencke, X Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Many network services and tools (eg network monitors, malware-detection systems, routing
and billing policy enforcement modules in ISPs) depend on identifying the type of traffic that …

Stegotorus: a camouflage proxy for the tor anonymity system

Z Weinberg, J Wang, V Yegneswaran… - Proceedings of the …, 2012 - dl.acm.org
Internet censorship by governments is an increasingly common practice worldwide. Internet
users and censors are locked in an arms race: as users find ways to evade censorship …

Multitask learning for network traffic classification

S Rezaei, X Liu - 2020 29th International Conference on …, 2020 - ieeexplore.ieee.org
Traffic classification has various applications in today's Internet, from resource allocation,
billing and QoS purposes in ISPs to firewall and malware detection in clients. Classical …

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification

C Dong, C Zhang, Z Lu, B Liu, B Jiang - Computer Networks, 2020 - Elsevier
Encrypted traffic classification is of great significance for advanced network services. Though
encryption methods seem unbroken in protecting users' privacy, existing studies have …

HEDGE: efficient traffic classification of encrypted and compressed packets

F Casino, KKR Choo, C Patsakis - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …

Shaping HTTP adaptive streams for a better user experience

R Houdaille, S Gouache - Proceedings of the 3rd Multimedia Systems …, 2012 - dl.acm.org
With increasing audio/video service consumption through unmanaged IP networks, HTTP
adaptive streaming techniques have emerged to handle bandwidth limitations and …