• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

多任务场景加密流量分类与参数分析

Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis.

作者信息

Wang Guanyu, Gu Yijun

机构信息

College of Information and Cyber Security, People's Public Security University of China, Beijing 100038, China.

出版信息

Sensors (Basel). 2024 May 12;24(10):3078. doi: 10.3390/s24103078.

DOI:10.3390/s24103078
PMID:38793930
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11125182/
Abstract

The widespread use of encrypted traffic poses challenges to network management and network security. Traditional machine learning-based methods for encrypted traffic classification no longer meet the demands of management and security. The application of deep learning technology in encrypted traffic classification significantly improves the accuracy of models. This study focuses primarily on encrypted traffic classification in the fields of network analysis and network security. To address the shortcomings of existing deep learning-based encrypted traffic classification methods in terms of computational memory consumption and interpretability, we introduce a Parameter-Efficient Fine-Tuning method for efficiently tuning the parameters of an encrypted traffic classification model. Experimentation is conducted on various classification scenarios, including Tor traffic service classification and malicious traffic classification, using multiple public datasets. Fair comparisons are made with state-of-the-art deep learning model architectures. The results indicate that the proposed method significantly reduces the scale of fine-tuning parameters and computational resource usage while achieving performance comparable to that of the existing best models. Furthermore, we interpret the learning mechanism of encrypted traffic representation in the pre-training model by analyzing the parameters and structure of the model. This comparison validates the hypothesis that the model exhibits hierarchical structure, clear organization, and distinct features.

摘要

加密流量的广泛使用给网络管理和网络安全带来了挑战。传统的基于机器学习的加密流量分类方法已无法满足管理和安全需求。深度学习技术在加密流量分类中的应用显著提高了模型的准确性。本研究主要聚焦于网络分析和网络安全领域的加密流量分类。为解决现有基于深度学习的加密流量分类方法在计算内存消耗和可解释性方面的不足,我们引入了一种参数高效微调方法,用于有效调整加密流量分类模型的参数。使用多个公共数据集在各种分类场景下进行实验,包括Tor流量服务分类和恶意流量分类。与最先进的深度学习模型架构进行公平比较。结果表明,所提出的方法在实现与现有最佳模型相当性能的同时,显著降低了微调参数的规模和计算资源使用。此外,我们通过分析模型的参数和结构来解释预训练模型中加密流量表示的学习机制。这种比较验证了模型具有层次结构、清晰组织和独特特征的假设。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/216a1e9ef08c/sensors-24-03078-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/ceb02d903c5c/sensors-24-03078-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/0669379f4e9e/sensors-24-03078-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/5bc0295dc63f/sensors-24-03078-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/18d629a64559/sensors-24-03078-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/8c501e1024d6/sensors-24-03078-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/749443b0ca30/sensors-24-03078-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/216a1e9ef08c/sensors-24-03078-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/ceb02d903c5c/sensors-24-03078-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/0669379f4e9e/sensors-24-03078-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/5bc0295dc63f/sensors-24-03078-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/18d629a64559/sensors-24-03078-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/8c501e1024d6/sensors-24-03078-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/749443b0ca30/sensors-24-03078-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7366/11125182/216a1e9ef08c/sensors-24-03078-g007.jpg

相似文献

1
Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis.多任务场景加密流量分类与参数分析
Sensors (Basel). 2024 May 12;24(10):3078. doi: 10.3390/s24103078.
2
Semi-2DCAE: a semi-supervision 2D-CNN AutoEncoder model for feature representation and classification of encrypted traffic.半二维卷积自编码器(Semi-2DCAE):一种用于加密流量特征表示与分类的半监督二维卷积神经网络自编码器模型。
PeerJ Comput Sci. 2023 Nov 9;9:e1635. doi: 10.7717/peerj-cs.1635. eCollection 2023.
3
CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method.CBD:一种基于深度学习的加密流量分类方案及通用预训练方法
Sensors (Basel). 2021 Dec 9;21(24):8231. doi: 10.3390/s21248231.
4
Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning.利用机器学习的加密网络流量分析与分类
Sensors (Basel). 2024 May 29;24(11):3509. doi: 10.3390/s24113509.
5
Robot Communication: Network Traffic Classification Based on Deep Neural Network.机器人通信:基于深度神经网络的网络流量分类
Front Neurorobot. 2021 Mar 19;15:648374. doi: 10.3389/fnbot.2021.648374. eCollection 2021.
6
Software defined networking based network traffic classification using machine learning techniques.基于软件定义网络并使用机器学习技术的网络流量分类
Sci Rep. 2024 Aug 29;14(1):20060. doi: 10.1038/s41598-024-70983-6.
7
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM.TSFN:一种使用BERT和LSTM的新型恶意流量分类方法
Entropy (Basel). 2023 May 19;25(5):821. doi: 10.3390/e25050821.
8
FedETC: Encrypted traffic classification based on federated learning.联邦ETC:基于联邦学习的加密流量分类
Heliyon. 2024 Aug 11;10(16):e35962. doi: 10.1016/j.heliyon.2024.e35962. eCollection 2024 Aug 30.
9
Deep Learning for Encrypted Traffic Classification and Unknown Data Detection.深度学习在加密流量分类和未知数据检测中的应用。
Sensors (Basel). 2022 Oct 9;22(19):7643. doi: 10.3390/s22197643.
10
Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure.用于云基础设施中加密网络流量检测与分类的智能模型。
PeerJ Comput Sci. 2024 May 27;10:e2027. doi: 10.7717/peerj-cs.2027. eCollection 2024.

本文引用的文献

1
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.CICIoT2023:物联网环境中大规模攻击的实时数据集和基准
Sensors (Basel). 2023 Jun 26;23(13):5941. doi: 10.3390/s23135941.