Zhang et al., 2025 - Google Patents
Non-Invasive User Profiling through Label Inference in FL-based Network Traffic ClassificationZhang et al., 2025
View PDF- Document ID
- 8779714763674763726
- Author
- Zhang H
- Ye F
- Publication year
External Links
Snippet
Artificial intelligence (AI) supported network traffic classification (NTC) has been developed lately for network measurement and quality-of-service (QoS) purposes. More recently, federated learning (FL) approach has been promoted for distributed NTC development due …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0876—Network utilization
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shen et al. | Machine learning-powered encrypted network traffic analysis: A comprehensive survey | |
Shen et al. | Accurate decentralized application identification via encrypted traffic analysis using graph neural networks | |
Rahman et al. | Internet of things intrusion detection: Centralized, on-device, or federated learning? | |
Osman et al. | ML-LGBM: A machine learning model based on light gradient boosting machine for the detection of version number attacks in RPL-based networks | |
Abbasloo et al. | Wanna make your TCP scheme great for cellular networks? Let machines do it for you! | |
US20200274815A1 (en) | System and method for classifying network traffic | |
Schwarzmann et al. | Estimating video streaming QoE in the 5G architecture using machine learning | |
Alomar et al. | {CausalSim}: A causal framework for unbiased {Trace-Driven} simulation | |
US11558769B2 (en) | Estimating apparatus, system, method, and computer-readable medium, and learning apparatus, method, and computer-readable medium | |
Gong et al. | To store or not? online data selection for federated learning with limited storage | |
Wails et al. | Tempest: Temporal dynamics in anonymity systems | |
Yeom et al. | LSTM-based collaborative source-side DDoS attack detection | |
Bhatia et al. | Identifying P2P traffic: A survey | |
Schmid et al. | Tangle ledger for decentralized learning | |
Li et al. | Cluster-based spatiotemporal background traffic generation for network simulation | |
Khan et al. | On the pitfalls of security evaluation of robust federated learning | |
Kattadige et al. | Videotrain: A generative adversarial framework for synthetic video traffic generation | |
Islam et al. | Identifying VoIP traffic in VPN tunnel via flow spatio-temporal features | |
Albaseer et al. | FedPot: A quality-aware collaborative and incentivized honeypot-based detector for smart grid networks | |
Digregorio et al. | Evaluating the impact of privacy-preserving federated learning on can intrusion detection | |
Zhang et al. | Non-Invasive User Profiling through Label Inference in FL-based Network Traffic Classification | |
Mills et al. | Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa | |
Ojetunde et al. | A selection technique for effective utilization of post-quantum cryptography in 5G application and beyond | |
Bar-on et al. | A small world–privacy preserving iot device-type fingerprinting with small datasets | |
Wang et al. | GAN-based adversarial patch for malware C2 traffic to bypass DL detector |