DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
出版年份 2022 全文链接
标题
DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
作者
关键词
Darknet traffic, Convolutional neural network, Long short-term memory, Self-attention mechanism, Spatial-temporal features, Classification
出版物
COMPUTERS & SECURITY
Volume -, Issue -, Pages 102663
出版商
Elsevier BV
发表日期
2022-02-17
DOI
10.1016/j.cose.2022.102663
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- TSCRNN: A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatiotemporal Features for Efficient Management of IIoT
- (2021) Kunda Lin et al. Computer Networks
- Self-attentive deep learning method for online traffic classification and its interpretability
- (2021) Guorui Xie et al. Computer Networks
- Unified Deep Learning approach for Efficient Intrusion Detection System using Integrated Spatial–Temporal Features
- (2021) P Rajesh Kanna et al. KNOWLEDGE-BASED SYSTEMS
- FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification
- (2021) Tal Shapira et al. IEEE Transactions on Network and Service Management
- A communication-channel-based method for detecting deeply camouflaged malicious traffic
- (2021) Yong Fang et al. Computer Networks
- Deep transfer learning framework for the identification of malicious activities to combat cyberattack
- (2021) Deepak Singh et al. Future Generation Computer Systems-The International Journal of eScience
- CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification
- (2020) Cong Dong et al. Computer Networks
- Interpreting network knowledge with attention mechanism for bearing fault diagnosis
- (2020) Zhi-bo Yang et al. APPLIED SOFT COMPUTING
- HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics
- (2020) Jiang Xie et al. COMPUTERS & SECURITY
- Attention-based bidirectional GRU networks for efficient HTTPS traffic classification
- (2020) Xun Liu et al. INFORMATION SCIENCES
- ToRank: Identifying the most influential suspicious domains in the Tor network
- (2019) Mhd Wesam Al-Nabki et al. EXPERT SYSTEMS WITH APPLICATIONS
- Identifying IoT devices and events based on packet length from encrypted traffic
- (2019) Antônio J. Pinheiro et al. COMPUTER COMMUNICATIONS
- A hybrid deep learning model for efficient intrusion detection in big data environment
- (2019) Mohammad Mehedi Hassan et al. INFORMATION SCIENCES
- On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild
- (2019) Morteza Safaei Pour et al. COMPUTERS & SECURITY
- A Dive into the Dark Web: Hierarchical Traffic Classification of Anonymity Tools
- (2019) Antonio Montieri et al. IEEE Transactions on Network Science and Engineering
- Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)
- (2018) Antonio Pescape et al. IEEE Transactions on Dependable and Secure Computing
- Tor anonymous traffic identification based on gravitational clustering
- (2017) Zhihong Rao et al. Peer-to-Peer Networking and Applications
- Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
- (2016) Claude Fachkha et al. IEEE Communications Surveys and Tutorials
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started