2019
DOI: 10.1007/s11554-019-00930-6
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning-based real-time VPN encrypted traffic identification methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(29 citation statements)
references
References 15 publications
0
29
0
Order By: Relevance
“…In addition, some DL-based models [ 44 , 45 , 52 ] are too simple to achieve good performance. Moreover, some 2D convolution-based CNN [ 47 , 48 ], RNN-based [ 50 ] and LSTM-based [ 51 ] models may be a little complex for the analysis of network traffic data and can reduce generalization ability. In this paper, the proposed 1D-convolution-based fusion model can balance these problems and achieve ideal results.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…In addition, some DL-based models [ 44 , 45 , 52 ] are too simple to achieve good performance. Moreover, some 2D convolution-based CNN [ 47 , 48 ], RNN-based [ 50 ] and LSTM-based [ 51 ] models may be a little complex for the analysis of network traffic data and can reduce generalization ability. In this paper, the proposed 1D-convolution-based fusion model can balance these problems and achieve ideal results.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…In the RNN model, the neurons in the same layer are connected to each other and the output of previous (hidden) layer will be considered in calculating the input of the next layer similar to the input layer. To cater for a greater understanding of time-series traffic classification and threat analysis, RNN may offer a special ability [3,33], shown in Figure 2. e processed data (traffic) are stored and referenced while processing the present data affecting the result.…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
“…e simultaneous advancement in hardware and reduction in costs have furthered the analytical capability and scope of ML applications in several fields including network traffic analysis. Of particular interest is the deep learning (DL) paradigm, gaining further adoption in data science, developing artificial intelligence that an influence a wide array of research and development [1,3]. Although still relatively nascent, deep learning primitives are being used to dynamically extract experience models from datasets generated under different environments and infer the underlying logic.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Real-time VPN traffic identification has become an increasingly important task in network management and security maintenance. The paper entitled "Deep learningbased real-time VPN encrypted traffic identification methods", co-authored by Guo et al [9], proposes two deep learning-based models to classify the traffic into VPN and non VPN traffic. These models utilize convolutional autoencoding (CAE) and convolutional neural network (CNN) respectively, preprocessing the traffic samples into session pictures, to accomplish the experiment objectives.…”
Section: Forensics On Other Applicationsmentioning
confidence: 99%