Tabular-to-Image Transformations for the Classification of Anonymous Network Traffic Using Deep Residual Networks.
Nathan BrinerDrake CullenJames HalladayDarrin MillerRiley PrimeauAbraham AvilaRam B. BasnetTenzin DoleckPublished in: IEEE Access (2023)
Keyphrases
- network traffic
- internet traffic
- image transformations
- anomaly detection
- intrusion detection
- image classification
- intrusion detection system
- feature extraction
- text classification
- machine learning
- feature vectors
- pattern recognition
- feature space
- rotation invariant
- feature selection
- image features
- peer to peer
- training set
- image matching