You are currently on the new version of our website. Access the old version .

224 Results Found

  • Article
  • Open Access
2 Citations
3,073 Views
23 Pages

6 November 2022

The detection of malicious encrypted traffic is an important part of modern network security research. The producers of the current malware do not pay attention to the fact that malicious encrypted traffic can also be detected; they do not construct...

  • Article
  • Open Access
4 Citations
5,909 Views
15 Pages

27 October 2023

To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security....

  • Review
  • Open Access
29 Citations
13,600 Views
17 Pages

29 May 2024

Encryption is a fundamental security measure to safeguard data during transmission to ensure confidentiality while at the same time posing a great challenge for traditional packet and traffic inspection. In response to the proliferation of diverse ne...

  • Article
  • Open Access
20 Citations
6,014 Views
21 Pages

6 February 2021

More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Int...

  • Article
  • Open Access
7 Citations
4,022 Views
24 Pages

A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning

  • Jie Cao,
  • Xing-Liang Yuan,
  • Ying Cui,
  • Jia-Cheng Fan and
  • Chin-Ling Chen

24 June 2022

One of the foundational and key means of optimizing network service in the field of network security is traffic identification. Various data transmission encryption technologies have been widely employed in recent years. Wrongdoers usually bypass the...

  • Article
  • Open Access
25 Citations
6,162 Views
13 Pages

Encrypted Malicious Traffic Detection Based on Word2Vec

  • Andrey Ferriyan,
  • Achmad Husni Thamrin,
  • Keiji Takeda and
  • Jun Murai

23 February 2022

Network-based intrusion detections become more difficult as Internet traffic is mostly encrypted. This paper introduces a method to detect encrypted malicious traffic based on the Transport Layer Security handshake and payload features without waitin...

  • Article
  • Open Access
5 Citations
4,550 Views
21 Pages

10 October 2024

The exponential growth of encrypted network traffic poses significant challenges for detecting malicious activities online. The scale of emerging malicious traffic is significantly smaller than that of normal traffic, and the imbalanced data distribu...

  • Review
  • Open Access
10 Citations
13,496 Views
31 Pages

Challenges and Advances in Analyzing TLS 1.3-Encrypted Traffic: A Comprehensive Survey

  • Jiuxing Zhou,
  • Wei Fu,
  • Wei Hu,
  • Zhihong Sun,
  • Tao He and
  • Zhihong Zhang

11 October 2024

The widespread adoption of encrypted communication protocols has significantly enhanced network security and user privacy, simultaneously elevating the importance of encrypted traffic analysis across various domains, including network anomaly detecti...

  • Article
  • Open Access
9 Citations
4,307 Views
21 Pages

12 May 2024

The widespread use of encrypted traffic poses challenges to network management and network security. Traditional machine learning-based methods for encrypted traffic classification no longer meet the demands of management and security. The applicatio...

  • Article
  • Open Access
1 Citations
2,694 Views
15 Pages

ET-Mamba: A Mamba Model for Encrypted Traffic Classification

  • Jian Xu,
  • Liangbing Chen,
  • Wenqian Xu,
  • Longxuan Dai,
  • Chenxi Wang and
  • Lei Hu

16 April 2025

With the widespread use of encryption protocols on network data, fast and effective encryption traffic classification can improve the efficiency of traffic analysis. A resampling method combining Wasserstein GAN and random selection is proposed for s...

  • Article
  • Open Access
1 Citations
1,867 Views
28 Pages

Estimating QoE from Encrypted Video Conferencing Traffic

  • Michael Sidorov,
  • Raz Birman,
  • Ofer Hadar and
  • Amit Dvir

8 February 2025

Traffic encryption is vital for internet security but complicates analytical applications like video delivery optimization or quality of experience (QoE) estimation, which often rely on clear text data. While many models address the problem of QoE pr...

  • Article
  • Open Access
16 Citations
3,748 Views
18 Pages

Deep-Forest-Based Encrypted Malicious Traffic Detection

  • Xueqin Zhang,
  • Min Zhao,
  • Jiyuan Wang,
  • Shuang Li,
  • Yue Zhou and
  • Shinan Zhu

The SSL/TLS protocol is widely used in data encryption transmission. Aiming at the problem of detecting SSL/TLS-encrypted malicious traffic with small-scale and unbalanced training data, a deep-forest-based detection method called DF-IDS is proposed...

  • Article
  • Open Access
9 Citations
4,822 Views
21 Pages

TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification

  • Ziao Liu,
  • Yuanyuan Xie,
  • Yanyan Luo,
  • Yuxin Wang and
  • Xiangmin Ji

10 March 2025

Encrypted network traffic classification remains a critical component in network security monitoring. However, existing approaches face two fundamental limitations: (1) conventional methods rely on manual feature engineering and are inadequate in han...

  • Article
  • Open Access
43 Citations
6,770 Views
16 Pages

BFCN: A Novel Classification Method of Encrypted Traffic Based on BERT and CNN

  • Zhaolei Shi,
  • Nurbol Luktarhan,
  • Yangyang Song and
  • Gaoqi Tian

With the speedy advancement of encryption technology and the exponential increase in applications, network traffic classification has become an increasingly important research topic. Existing methods for classifying encrypted traffic have certain lim...

  • Article
  • Open Access
15 Citations
5,301 Views
17 Pages

22 February 2023

Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal...

  • Article
  • Open Access
580 Views
20 Pages

GCN-MHA Method for Encrypted Malicious Traffic Detection and Classification

  • Yanan Liu,
  • Suhao Wang,
  • Zheng Zhang,
  • Tianhao Hou,
  • Jipeng Shen,
  • Pengfei Wang,
  • Shuo Qiu and
  • Lejun Ma

25 November 2025

Modern network attacks are becoming stealthier and smarter. Attackers use encryption to cover up malicious traffic, which makes it really hard to detect. To solve this problem, this paper introduces a new model called Graph Convolutional Network with...

  • Article
  • Open Access
53 Citations
4,806 Views
17 Pages

17 June 2021

The wide application of encryption technology has made traffic classification gradually become a major challenge in the field of network security. Traditional methods such as machine learning, which rely heavily on feature engineering and others, can...

  • Article
  • Open Access
11 Citations
4,354 Views
23 Pages

Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification

  • Jee-Tae Park,
  • Chang-Yui Shin,
  • Ui-Jun Baek and
  • Myung-Sup Kim

5 April 2024

The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive an...

  • Article
  • Open Access
3 Citations
3,580 Views
22 Pages

An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTM

  • Yihe Mei,
  • Nurbol Luktarhan,
  • Guodong Zhao and
  • Xiaotong Yang

Classifying encrypted traffic is a crucial aspect of network security. However, popular methods face several limitations, such as a reliance on feature engineering and the need for complex model architectures to ensure effective classification. To ad...

  • Article
  • Open Access
8 Citations
3,744 Views
21 Pages

Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction

  • In-Su Jung,
  • Yu-Rae Song,
  • Lelisa Adeba Jilcha,
  • Deuk-Hun Kim,
  • Sun-Young Im,
  • Shin-Woo Shim,
  • Young-Hwan Kim and
  • Jin Kwak

12 June 2024

With the continuously growing requirement for encryption in network environments, web browsers are increasingly employing hypertext transfer protocol security. Despite the increase in encrypted malicious network traffic, the encryption itself limits...

  • Article
  • Open Access
1,483 Views
26 Pages

MFF: A Multimodal Feature Fusion Approach for Encrypted Traffic Classification

  • Hong Huang,
  • Yinghang Zhou,
  • Feng Jiang,
  • Xiaolin Zhou and
  • Qingping Jiang

With the widespread adoption of encryption technologies, encrypted traffic classification has become essential for maintaining network security awareness and optimizing service quality. However, existing deep learning-based methods often rely on fixe...

  • Article
  • Open Access
10 Citations
3,761 Views
22 Pages

23 January 2023

Telecommuting and telelearning have gradually become mainstream lifestyles in the post-epidemic era. The extensive interconnection of massive terminals gives attackers more opportunities, which brings more significant challenges to network traffic se...

  • Article
  • Open Access
1 Citations
1,995 Views
24 Pages

With the increasing sophistication of network attacks, machine learning (ML)-based methods have showcased promising performance in attack detection. However, ML-based methods often suffer from high false rates when tackling encrypted malicious traffi...

  • Review
  • Open Access
19 Citations
8,805 Views
17 Pages

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection

  • Madushi H. Pathmaperuma,
  • Yogachandran Rahulamathavan,
  • Safak Dogan and
  • Ahmet M. Kondoz

9 October 2022

Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks. In this paper, a novel Deep Neural Network (DNN) based on a user act...

  • Article
  • Open Access
15 Citations
5,587 Views
18 Pages

9 December 2021

With the rapid increase in encrypted traffic in the network environment and the increasing proportion of encrypted traffic, the study of encrypted traffic classification has become increasingly important as a part of traffic analysis. At present, in...

  • Article
  • Open Access
3 Citations
2,247 Views
24 Pages

AI-Based Malicious Encrypted Traffic Detection in 5G Data Collection and Secure Sharing

  • Gang Han,
  • Haohe Zhang,
  • Zhongliang Zhang,
  • Yan Ma and
  • Tiantian Yang

With the development and widespread application of network information, new technologies led by 5G are emerging, resulting in an increasingly complex network security environment and more diverse attack methods. Unlike traditional networks, 5G networ...

  • Article
  • Open Access
16 Citations
3,438 Views
26 Pages

18 November 2022

Encrypted traffic classification can essentially support network QoS (Quality of Service) and user QoE (Quality of Experience). However, as a typical supervised learning problem, it requires sufficiently labeled samples, which should be frequently up...

  • Article
  • Open Access
577 Views
29 Pages

CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic

  • Jinsha Zhang,
  • Xiaoying Wang,
  • Chunhui Li,
  • Qingjie Zhang,
  • Guoqing Yang,
  • Xinyu Li,
  • Fangfang Cui,
  • Ruize Gu,
  • Panpan Qi and
  • Shuai Liu

24 December 2025

While ensuring the accuracy of encrypted malicious traffic detection, improving model training speed remains a challenge. In order to solve this challenge, we propose CNNRes-DIndRNN for detecting encrypted malicious traffic classification. This model...

  • Article
  • Open Access
6 Citations
4,726 Views
22 Pages

20 December 2021

In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware...

  • Article
  • Open Access
9 Citations
3,722 Views
22 Pages

LAMBERT: Leveraging Attention Mechanisms to Improve the BERT Fine-Tuning Model for Encrypted Traffic Classification

  • Tao Liu,
  • Xiting Ma,
  • Ling Liu,
  • Xin Liu,
  • Yue Zhao,
  • Ning Hu and
  • Kayhan Zrar Ghafoor

22 May 2024

Encrypted traffic classification is a crucial part of privacy-preserving research. With the great success of artificial intelligence technology in fields such as image recognition and natural language processing, how to classify encrypted traffic bas...

  • Article
  • Open Access
5 Citations
3,095 Views
19 Pages

17 February 2025

Encrypted traffic classification poses significant challenges in network security due to the growing use of encryption protocols, which obscure packet payloads. This paper introduces a novel framework that leverages dual embedding mechanisms and Grap...

  • Article
  • Open Access
19 Citations
17,783 Views
24 Pages

Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App

  • Asmara Afzal,
  • Mehdi Hussain,
  • Shahzad Saleem,
  • M. Khuram Shahzad,
  • Anthony T. S. Ho and
  • Ki-Hyun Jung

24 August 2021

Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned indiv...

  • Article
  • Open Access
1,246 Views
21 Pages

9 September 2025

We propose a Transformer-based data augmentation framework with a time-series dual-stream architecture to address performance degradation in encrypted network traffic classification caused by class imbalance between attack and benign traffic. The pro...

  • Article
  • Open Access
7 Citations
4,640 Views
25 Pages

Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles

  • Gianmarco Baldini,
  • José L. Hernandez-Ramos,
  • Slawomir Nowak,
  • Ricardo Neisse and
  • Mateusz Nowak

22 September 2020

It has been proven in research literature that the analysis of encrypted traffic with statistical analysis and machine learning can reveal the type of activities performed by a user accessing the network, thus leading to privacy risks. In particular,...

  • Systematic Review
  • Open Access
36 Citations
17,295 Views
30 Pages

Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review

  • Il Hwan Ji,
  • Ju Hyeon Lee,
  • Min Ji Kang,
  • Woo Jin Park,
  • Seung Ho Jeon and
  • Jung Taek Seo

30 January 2024

As cyber-attacks increase in unencrypted communication environments such as the traditional Internet, protected communication channels based on cryptographic protocols, such as transport layer security (TLS), have been introduced to the Internet. Acc...

  • Article
  • Open Access
4 Citations
2,841 Views
12 Pages

L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification

  • Shihe Zhang,
  • Ruidong Chen,
  • Jingxue Chen,
  • Yukun Zhu,
  • Manyuan Hua,
  • Jiaying Yuan and
  • Fenghua Xu

28 October 2024

Recently, with a crucial role in developing smart transportation systems, the Internet of Vehicles (IoV), with all kinds of in-vehicle devices, has undergone significant advancement for autonomous driving, in-vehicle infotainment, etc. With the devel...

  • Article
  • Open Access
1,851 Views
24 Pages

11 November 2024

While encryption enhances data security, it also presents significant challenges for network traffic analysis, especially in detecting malicious activities. To tackle this challenge, this paper introduces combined Attention-aware Feature Fusion and C...

  • Article
  • Open Access
1 Citations
2,733 Views
23 Pages

15 March 2025

Encrypted traffic classification is crucial for network security and management, enabling applications like QoS control and malware detection. However, the emergence of new encryption protocols, particularly TLS 1.3, poses challenges for traditional...

  • Article
  • Open Access
1 Citations
3,032 Views
19 Pages

Classifying mobile applications from encrypted network traffic is a common and basic requirement in network security and network management. Existing works classify mobile applications from flows, based on which application fingerprints and classifie...

  • Article
  • Open Access
74 Citations
28,168 Views
17 Pages

26 August 2021

The lack of publicly available up-to-date datasets contributes to the difficulty in evaluating intrusion detection systems. This paper introduces HIKARI-2021, a dataset that contains encrypted synthetic attacks and benign traffic. This dataset confor...

  • Article
  • Open Access
1,612 Views
16 Pages

30 October 2025

The classification of encrypted traffic is critical for network security, yet it faces a significant “few-shot” challenge as novel applications with scarce labeled data continuously emerge. This complexity arises from the high-dimensional...

  • Article
  • Open Access
25 Citations
4,750 Views
16 Pages

The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry and, consequently, in smart grids. The Peekaboo attack was created to compromise DNP3 traffic, in which a man-in-the-middle on a communication link can cap...

  • Article
  • Open Access
1 Citations
1,080 Views
19 Pages

3 May 2025

The identification and classification of network traffic are crucial for maintaining network security, optimizing network management, and ensuring reliable service quality. These functions help prevent malicious activities, such as network attacks an...

  • Article
  • Open Access
17 Citations
4,107 Views
24 Pages

In recent years, privacy awareness is concerned due to many Internet services have chosen to use encrypted agreements. In order to improve the quality of service (QoS), the network encrypted traffic behaviors are classified based on machine learning...

  • Article
  • Open Access
1 Citations
3,305 Views
15 Pages

With the exponential growth of encrypted communication over the internet, research into systems capable of analyzing large volumes of encrypted traffic is essential. This study focuses on evaluating the performance of two prominent tools, ssldump and...

  • Article
  • Open Access
1,518 Views
22 Pages

Mobile traffic classification serves as a fundamental component in network security systems. In recent years, pre-training methods have significantly advanced this field. However, as mobile traffic is typically mixed with third-party services, the de...

  • Article
  • Open Access
18 Citations
13,943 Views
17 Pages

24 December 2021

Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, w...

  • Article
  • Open Access
12 Citations
8,198 Views
16 Pages

A Deep Learning-Based Encrypted VPN Traffic Classification Method Using Packet Block Image

  • Weishi Sun,
  • Yaning Zhang,
  • Jie Li,
  • Chenxing Sun and
  • Shuzhuang Zhang

27 December 2022

Network traffic classification has great significance for network security, network management and other fields. However, in recent years, the use of VPN and TLS encryption had presented network traffic classification with new challenges. Due to the...

  • Review
  • Open Access
9 Citations
4,658 Views
18 Pages

CNN for User Activity Detection Using Encrypted In-App Mobile Data

  • Madushi H. Pathmaperuma,
  • Yogachandran Rahulamathavan,
  • Safak Dogan and
  • Ahmet Kondoz

21 February 2022

In this study, a simple yet effective framework is proposed to characterize fine-grained in-app user activities performed on mobile applications using a convolutional neural network (CNN). The proposed framework uses a time window-based approach to s...

  • Article
  • Open Access
4 Citations
2,962 Views
11 Pages

25 September 2022

The accurate classification of traffic data is challenging for network management and security, especially in imbalanced situations. The limitation of the existing convolutional neural networks is that they have problems such as overfitting, instabil...

of 5