IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020
DOI: 10.1109/infocomwkshps50562.2020.9162891
|View full text |Cite
|
Sign up to set email alerts
|

App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…With the popularization and development of mobile networks, the classification of mobile traffic has also attracted the attention of many researchers [26,[35][36][37][38][39][40]. In 2019, Aceto et al [36] first proposed a deep learning-based mobile traffic classifier, which can deal with encrypted traffic and reflect its complex traffic patterns.…”
Section: Deep Learning Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…With the popularization and development of mobile networks, the classification of mobile traffic has also attracted the attention of many researchers [26,[35][36][37][38][39][40]. In 2019, Aceto et al [36] first proposed a deep learning-based mobile traffic classifier, which can deal with encrypted traffic and reflect its complex traffic patterns.…”
Section: Deep Learning Modelmentioning
confidence: 99%
“…Finally, the class predicted by the model is obtained. In 2020, Wang et al [39,40] proposed a hybrid neural network model App-Net for mobile applications (APP) traffic identification, which can learn effective features from the original TLS flows. It achieves very good performance on real datasets covering 80 applications.…”
Section: Deep Learning Modelmentioning
confidence: 99%
“…Network state detection can be considered a subset of the more general traffic classification field. To this end, ML-based traffic classification has been applied extensively against cyber attacks by diagnosing malicious traffic [10]- [14] and classifying encrypted traffic [15]- [19]. ML algorithms have also been used for comprehending the traffic flow [20], providing application-aware traffic classification [21], and classifying the network traffic via semi-supervised learning [15] or supervised learning [22] methods.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the individual optimal solution and global optimal solution of each particle are initialized. Then, the algorithm updates the position and velocity of the particle, according to the velocity formula, as in (5), and the position formula, as in (6), where r 1 and r 2 are random numbers, w represents the internal factor, c 1 represents the local velocity factor, c 2 represents the global velocity factor, pbest represents the individual optimal solution, and gbest represents the global optimal solution. After the velocity and position of the particles are updated, the particle fitness is recalculated, and the individual optimal solution pbest and the global optimal solution gbest are updated, according to the fitness.…”
Section: Mopsomentioning
confidence: 99%
“…In the field of network intrusion detection, numerous scholars have extensively explored the network model of malicious network traffic classification and achieved excellent results. These studies often focused on feature selection [4], training strategy [5], model stacking [6] and other aspects, but there were few studies on the topological structure of classification models. A network that can solve complex problems often also has a complex structure, such as AlexNet [7], InceptionNet [8], MobileNet [9] and other architectures that were carefully designed by researchers in the field of image recognition.…”
Section: Introductionmentioning
confidence: 99%