Login / Signup
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Leiqi Wang
Xiu Ma
Ning Li
Qiujian Lv
Yan Wang
Weiqing Huang
Haiyan Chen
Published in:
Comput. Secur. (2023)
Keyphrases
</>
network traffic
internet traffic
computer networks
fingerprint classification
network resources
normal traffic
intrusion detection
anomaly detection
traffic patterns
malicious traffic
network security
traffic engineering
singular points
intrusion detection system
traffic data
long range dependence
network intrusion detection
network structure
ip addresses
pairwise
ddos attacks
bit rate
computer systems
image processing
machine learning
neural network