4.5 Article

A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments

Minxian Xu et al.

Summary: Cloud computing is a successful paradigm for the IT industry, but it faces challenges in resource provisioning for dynamic workloads. To address this, the researchers propose an efficient supervised learning-based Deep Neural Network (esDNN) approach for accurate cloud workload prediction. They utilize a sliding window and a revised Gated Recurrent Unit (GRU) to achieve accurate and efficient predictions. Experimental results based on realistic traces from Alibaba and Google cloud data centers demonstrate the effectiveness of esDNN in reducing mean square errors and optimizing costs for service providers.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Computer Science, Theory & Methods

An In-Depth Study of Microservice Call Graph and Runtime Performance

Shutian Luo et al.

Summary: This paper presents a substantial analysis of large-scale deployments of microservices in Alibaba clusters, focusing on the characterization of microservice dependency and runtime performance. The study also includes the design of resource management policies to optimize memory resources for microservices.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2022)

Article Computer Science, Information Systems

CoScal: Multifaceted Scaling of Microservices With Reinforcement Learning

Minxian Xu et al.

Summary: The trend of transitioning from monolithic applications to microservices in cloud computing environments has posed new performance challenges. In this paper, a multi-faceted scaling approach called CoScal is proposed, which utilizes prediction algorithms and reinforcement learning to optimize system performance. Extensive experiments demonstrate significant improvements compared to state-of-the-art scaling techniques.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Computer Science, Information Systems

Multi-Tier Workload Consolidations in the Cloud: Profiling, Modeling and Optimization

Kejiang Ye et al.

Summary: This article emphasizes the importance of reducing tail latency to improve user-perceived service experience. The authors propose a novel profiling-based consolidation methodology to reduce tail latency while minimizing the number of physical machines used. Experimental results show significant reduction in tail latency compared to other methods.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Proceedings Paper Computer Science, Information Systems

Understanding Host Network Stack Overheads

Qizhe Cai et al.

Summary: This paper investigates the performance of Linux kernel network stack at 100Gbps access link bandwidths and reveals a fundamental shift in host network stack bottlenecks. The relatively stagnant technology trends for other host resources pose challenges for future network stack design.

SIGCOMM '21: PROCEEDINGS OF THE 2021 ACM SIGCOMM 2021 CONFERENCE (2021)

Article Computer Science, Artificial Intelligence

Deep packet: a novel approach for encrypted traffic classification using deep learning

Mohammad Lotfollahi et al.

SOFT COMPUTING (2020)

Article Computer Science, Artificial Intelligence

Traffic identification and traffic analysis based on support vector machine

Youchan Zhu et al.

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Toward effective mobile encrypted traffic classification through deep learning

Giuseppe Aceto et al.

NEUROCOMPUTING (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Real-Time Encrypted Traffic Classification via Lightweight Neural Networks

Jin Cheng et al.

2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2020)

Article Computer Science, Information Systems

Large-Scale Mobile App Identification Using Deep Learning

Shahbaz Rezaei et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Deep Learning for Encrypted Traffic Classification: An Overview

Shahbaz Rezaei et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Hardware & Architecture

MIMETIC: Mobile encrypted traffic classification using multimodal deep learning

Giuseppe Aceto et al.

COMPUTER NETWORKS (2019)

Proceedings Paper Computer Science, Information Systems

Dynamic Network Anomaly Detection System by Using Deep Learning Techniques

Peng Lin et al.

CLOUD COMPUTING - CLOUD 2019 (2019)

Article Computer Science, Theory & Methods

Robust Smartphone App Identification via Encrypted Network Traffic Analysis

Vincent F. Taylor et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network

Zhuang Zou et al.

IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS) (2018)

Article Computer Science, Information Systems

Deciphering malware's use of TLS (without decryption)

Blake Anderson et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)

Article Computer Science, Theory & Methods

Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams

Meng Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity

Blake Anderson et al.

KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (2017)

Article Computer Science, Information Systems

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

Yanjie Fu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Identifying Encrypted Malware Traffic with Contextual Flow Data

Blake Anderson et al.

AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY (2016)

Article Computer Science, Information Systems

A survey of methods for encrypted traffic classification and analysis

Petr Velan et al.

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2015)

Article Computer Science, Information Systems

A Survey of Payload-Based Traffic Classification Approaches

Michael Finsterbusch et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)