Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ...
详细信息
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequent identification presents a formidable *** existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets,with the dataset’s imbalance significantly affecting the model’s *** the present study,a new model,referred to as UD-VLD(Unbalanced Dataset-VAE-LSTM-DRN),was proposed to address above *** proposed model is an encrypted traffic identification model for handling unbalanced *** encoder of the variational autoencoder(VAE)is combined with the decoder and Long-short term Memory(LSTM)in UD-VLD model to realize the data enhancement processing of the original unbalanced *** enhanced data is processed by transforming the deep residual network(DRN)to address neural network gradient-related ***,the data is classified and *** UD-VLD model integrates the related techniques of deep learning into the encrypted traffic recognition technique,thereby solving the processing problem for unbalanced *** UD-VLD model was tested using the publicly available Tor dataset and VPN *** UD-VLD model is evaluated against other comparative models in terms of accuracy,loss rate,precision,recall,F1-score,total time,and ROC *** results reveal that the UD-VLD model exhibits better performance in both binary and multi classification,being higher than other encrypted traffic recognition models that exist for unbalanced ***,the evaluation performance indicates that the UD-VLD model effectivelymitigates the impact of unbalanced data on traffic *** can serve as a novel solution for encrypted traffic identification.
Industrial network control systems (INCSs) are easy to be targeted by attackers due to their high economic value. Most of the existing defense methods are deployed at the network boundary, which causes high-security r...
详细信息
The demand for continual machine learning in the context of limited computational resources and data availability is critical in the evolving landscape of the connected digital world. Current network applications pred...
详细信息
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is ...
详细信息
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is challenging for an EMP sensor to measure a wideband electromagnetic pulse without distortion for the whole ***,analyzing the distortion of EMP measurement is crucial to evaluating the sensor distortion characteristics and correcting the measurement *** fidelity is usually employed to evaluate the distortion of an ***,this metric depends on specific signal waveforms,thus is unsuitable for evaluating and analyzing the distortion of EMP *** this paper,an associated-hermite-function based distortion analysis method including system transfer matrices and distortion rates is proposed,which is general and independent from individual *** system transfer matrix and distortion rate can be straightforwardly calculated by the signal orthogonal transformation coefficients using associated-hermite *** of a sensor *** is then visualized via the system transfer matrix,which is convenient in quantitative analysis of the *** of a current probe,a coaxial pulse voltage probe and a B-field sensor were performed,based on which the feasibility and effectiveness of the proposed distortion analysis method is successfully verified.
The convergence of the Internet of Things (IoT) and blockchain technologies has gained substantial traction in recent years, owing to the rapid advancement of communication technologies worldwide. This research introd...
详细信息
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the...
详细信息
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of these algorithms may not be sufficient to extract the complex structure of user interaction *** paper presents a new approach to address such issues,utilizing the graph convolution network to extract association *** proposed approach mainly includes three modules:Embedding layer,forward propagation layer,and score prediction *** embedding layer models users and items according to their interaction information and generates initial feature vectors as input for the forward propagation *** forward propagation layer designs two parallel graph convolution networks with self-connections,which extract higher-order association relevance from users and items separately by multi-layer graph ***,the forward propagation layer integrates the attention factor to assign different weights among the hop neighbors of the graph convolution network fusion,capturing more comprehensive association relevance between users and items as input for the score prediction *** score prediction layer introduces MLP(multi-layer perceptron)to conduct non-linear feature interaction between users and items,***,the prediction score of users to items is *** recall rate and normalized discounted cumulative gain were used as evaluation *** proposed approach effectively integrates higher-order information in user entries,and experimental analysis demonstrates its superiority over the existing algorithms.
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st...
详细信息
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense strategies can be formulated,significantly improving network protection *** attacks usually manifest as an abnormal increase in network traffic,and their diverse types of attacks,along with a severe data imbalance,make it difficult for traditional classification methods to effectively identify a small number of attack *** solve this problem,this paper proposes a DDoS recognition method CVWGG(Conditional Variational Autoencoder-Wasserstein Generative Adversarial Network-gradient penalty-Gated Recurrent Unit)for unbalanced data,which generates less noisy data and high data quality compared with existing *** mainly includes unbalanced data processing for CVWG,feature extraction,and *** uses the CVAE(Conditional Variational Autoencoder)to improve the WGAN(Wasserstein Generative Adversarial Network)and introduces a GP(gradient penalty)term to design the loss function to generate balanced data,which enhances the learning ability and stability of the ***,the GRU(Gated Recurrent Units)are used to capture the temporal features and patterns of the ***,the logsoftmax function is used to differentiate DDoS attack *** PyCharm and Python 3.10 for programming and evaluating performance with metrics such as accuracy and precision,the results show that the method achieved accuracy rates of 96.0%and 97.3%on two datasets,***,comparison and ablation experiment results demonstrate that CVWGG effectively mitigates the imbalance between DDoS attack categories,significantly improves the classification accuracy of different types of attacks and provides a valuable reference for network security defense.
Reluctance motor has the advantages of simple structure, low amount of permanent magnet and high stability. But reluctance motor's limited torque density hinders its widespread application. However, the problem of...
详细信息
The Modular Multilevel Converter-based High Voltage Direct Current (MMC-HVDC) transmission system has become the most commonly used transmission technology in DC transmission projects. In order to save transmission an...
详细信息
An orthogonal dual-channel-based wireless charging system is designed to desensitize the wireless charging system to free rotation and transmit energy and data simultaneously. The radial magnetic flux and rectangular ...
详细信息
暂无评论