2021
DOI: 10.3390/sym13061080
|View full text |Cite
|
Sign up to set email alerts
|

ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network

Abstract: The wide application of encryption technology has made traffic classification gradually become a major challenge in the field of network security. Traditional methods such as machine learning, which rely heavily on feature engineering and others, can no longer fully meet the needs of encrypted traffic classification. Therefore, we propose an Inception-LSTM(ICLSTM) traffic classification method in this paper to achieve encrypted traffic service identification. This method converts traffic data into common gray … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(27 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…Thus, the results are further improved. Lu et al [18] tried to combine CNN and LSTM, and proposed a model named ICLSTM (Inception-LSTM) for the classification of encrypted traffic. In their study, the raw encrypted traffic data was first converted into a grayscale image.…”
Section: Deep Learning Based Detection Methodsmentioning
confidence: 99%
“…Thus, the results are further improved. Lu et al [18] tried to combine CNN and LSTM, and proposed a model named ICLSTM (Inception-LSTM) for the classification of encrypted traffic. In their study, the raw encrypted traffic data was first converted into a grayscale image.…”
Section: Deep Learning Based Detection Methodsmentioning
confidence: 99%
“…CNN and Long-short term memory (LSTM) models are the most frequently used deep learning models for this task. The models are sometimes used together [8], [9], [10] or separately [4], [5]. These papers used various models to achieve different accuracies with different datasets.…”
Section: Previous Workmentioning
confidence: 99%
“…This creates a generalization problem as models tend to give uneven values of accuracy when tested with unseen data. Lu et al [8], used both CNN and LSTM for local and temporal feature extraction respectively. Both models were arranged in parallel, enabling features to be extracted and trained simultaneously, concatenated, then classified.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2021, in Lu et al's work [35], the difficulties of traffic feature extraction efforts were avoided by focusing on DL to categorize network traffic as encrypted or not. The authors proposed an Inception-LSTM (ICLSTM) service to detect encrypted traffic, in which they converted the traffic data to gray images and then built an ICLSTM neural network to extract the important features and conduct effective traffic classification.…”
Section: Introductionmentioning
confidence: 99%