334 research outputs found
Darknet Traffic Analysis A Systematic Literature Review
The primary objective of an anonymity tool is to protect the anonymity of its
users through the implementation of strong encryption and obfuscation
techniques. As a result, it becomes very difficult to monitor and identify
users activities on these networks. Moreover, such systems have strong
defensive mechanisms to protect users against potential risks, including the
extraction of traffic characteristics and website fingerprinting. However, the
strong anonymity feature also functions as a refuge for those involved in
illicit activities who aim to avoid being traced on the network. As a result, a
substantial body of research has been undertaken to examine and classify
encrypted traffic using machine learning techniques. This paper presents a
comprehensive examination of the existing approaches utilized for the
categorization of anonymous traffic as well as encrypted network traffic inside
the darknet. Also, this paper presents a comprehensive analysis of methods of
darknet traffic using machine learning techniques to monitor and identify the
traffic attacks inside the darknet.Comment: 35 Pages, 13 Figure
FedEdge AI-TC: A Semi-supervised Traffic Classification Method based on Trusted Federated Deep Learning for Mobile Edge Computing
As a typical entity of MEC (Mobile Edge Computing), 5G CPE (Customer Premise
Equipment)/HGU (Home Gateway Unit) has proven to be a promising alternative to
traditional Smart Home Gateway. Network TC (Traffic Classification) is a vital
service quality assurance and security management method for communication
networks, which has become a crucial functional entity in 5G CPE/HGU. In recent
years, many researchers have applied Machine Learning or Deep Learning (DL) to
TC, namely AI-TC, to improve its performance. However, AI-TC faces challenges,
including data dependency, resource-intensive traffic labeling, and user
privacy concerns. The limited computing resources of 5G CPE further complicate
efficient classification. Moreover, the "black box" nature of AI-TC models
raises transparency and credibility issues. The paper proposes the FedEdge
AI-TC framework, leveraging Federated Learning (FL) for reliable Network TC in
5G CPE. FL ensures privacy by employing local training, model parameter
iteration, and centralized training. A semi-supervised TC algorithm based on
Variational Auto-Encoder (VAE) and convolutional neural network (CNN) reduces
data dependency while maintaining accuracy. To optimize model light-weight
deployment, the paper introduces XAI-Pruning, an AI model compression method
combined with DL model interpretability. Experimental evaluation demonstrates
FedEdge AI-TC's superiority over benchmarks in terms of accuracy and efficient
TC performance. The framework enhances user privacy and model credibility,
offering a comprehensive solution for dependable and transparent Network TC in
5G CPE, thus enhancing service quality and security.Comment: 13 pages, 13 figure
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey
Modern communication systems and networks, e.g., Internet of Things (IoT) and cellular networks, generate a massive and heterogeneous amount of traffic data. In such networks, the traditional network management techniques for monitoring and data analytics face some challenges and issues, e.g., accuracy, and effective processing of big data in a real-time fashion. Moreover, the pattern of network traffic, especially in cellular networks, shows very complex behavior because of various factors, such as device mobility and network heterogeneity. Deep learning has been efficiently employed to facilitate analytics and knowledge discovery in big data systems to recognize hidden and complex patterns. Motivated by these successes, researchers in the field of networking apply deep learning models for Network Traffic Monitoring and Analysis (NTMA) applications, e.g., traffic classification and prediction. This paper provides a comprehensive review on applications of deep learning in NTMA. We first provide fundamental background relevant to our review. Then, we give an insight into the confluence of deep learning and NTMA, and review deep learning techniques proposed for NTMA applications. Finally, we discuss key challenges, open issues, and future research directions for using deep learning in NTMA applications.publishedVersio
- …