Pinot: Programmable infrastructure for networking

R Beltiukov, S Chandrasekaran, A Gupta… - Proceedings of the …, 2023 - dl.acm.org
As modern network communication moves closer to being fully encrypted and hence less
exposed to passive monitoring, traditional network measurements that rely on unencrypted …

SETA: Scalable encrypted traffic analytics in multi-Gbps networks

KN Choi, A Wijesinghe, CMM Kattadige… - 2020 IEEE 45th …, 2020 - ieeexplore.ieee.org
While end-to-end encryption brings security and privacy to the end-users, it makes legacy
solutions such as Deep Packet Inspection ineffective. Despite the recent work in machine …

Ggfast: Automating generation of flexible network traffic classifiers

J Piet, D Nwoji, V Paxson - Proceedings of the ACM SIGCOMM 2023 …, 2023 - dl.acm.org
When employing supervised machine learning to analyze network traffic, the heart of the
task often lies in developing effective features for the ML to leverage. We develop GGFAST …

Seta++: Real-time scalable encrypted traffic analytics in multi-gbps networks

C Kattadige, KN Choi, A Wijesinghe… - … on Network and …, 2021 - ieeexplore.ieee.org
The security and privacy of the end-users are a few of the most important components of a
communication network. Though end-to-end encryption (eg, TLS/SSL) fulfils this …

Separating flows in encrypted tunnel traffic

A Hartl, J Fabini, T Zseby - 2022 21st IEEE International …, 2022 - ieeexplore.ieee.org
In many scenarios like wireless Internet access or encrypted VPN tunnels, encryption is
performed on a per-packet basis. While this encryption approach effectively protects the …

Otter: A scalable high-resolution encrypted traffic identification engine

E Papadogiannaki, C Halevidis, P Akritidis… - Research in Attacks …, 2018 - Springer
Several security applications rely on monitoring network traffic, which is increasingly
becoming encrypted. In this work, we propose a pattern language to describe packet trains …

Many or few samples?: Comparing transfer, contrastive and meta-learning in encrypted traffic classification

I Guarino, C Wang, A Finamore… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
The popularity of Deep Learning (DL), coupled with network traffic visibility reduction due to
the increased adoption of HTTPS, QUIC, and DNS-SEC, re-ignited interest towards Traffic …

Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

Adaptive encrypted traffic characterization via deep representation learning

J Wintrode, D DeTienne - 2022 Intermountain Engineering …, 2022 - ieeexplore.ieee.org
Near ubiquitous encryption poses a challenge for security and quality of service (QoS)
applications that rely on deep packet inspection (DPI) techniques for categorizing traffic …

ILETC: Incremental learning for encrypted traffic classification using generative replay and exemplar

W Zhu, X Ma, Y Jin, R Wang - Computer Networks, 2023 - Elsevier
With the constant updating of applications and the emergence of various encryption
technologies, it is important to achieve continuous learning of encrypted traffic. Traditional …