“…The ML-based models utilize sequences of packet sizes, times, and other connection metadata statistics to perform classification and threat detection even in encrypted traffic. Nevertheless, further adoption of ML and its development is being slowed down because of the lack of representative datasets and supportive tools [21]. As a result, traffic classification experiments require more effort, are less reproducible, and are prone to unintentional errors.…”