期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks
1
作者 Ming Liu Qichao Yang +1 位作者 Wenqing Wang Shengli Liu 《Computers, Materials & Continua》 2025年第2期2985-3004,共20页
The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable chall... The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable challenge to cybersecurity. Traditional machine learning and deep learning techniques often fall short in identifying encrypted malicious traffic due to their inability to fully extract and utilize the implicit relational and positional information embedded within data packets. This limitation has led to an unresolved challenge in the cybersecurity community: how to effectively extract valuable insights from the complex patterns of traffic packet transmission. Consequently, this paper introduces the TB-Graph model, an encrypted malicious traffic classification model based on a relational graph attention network. The model is a heterogeneous traffic burst graph that embeds side-channel features, which are unaffected by encryption, into the graph nodes and connects them with three different types of burst edges. Subsequently, we design a relational positional coding that prevents the loss of temporal relationships between the original traffic flows during graph transformation. Ultimately, TB-Graph leverages the powerful graph representation learning capabilities of Relational Graph Attention Network (RGAT) to extract latent behavioral features from the burst graph nodes and edge relationships. Experimental results show that TB-Graph outperforms various state-of-the-art methods in fine-grained encrypted malicious traffic classification tasks on two public datasets, indicating its enhanced capability for identifying encrypted malicious traffic. 展开更多
关键词 Encrypted malicious traffic classification traffic burst graph graph representation learning deep learning
在线阅读 下载PDF
Downlink SINR and Rate Distribution of Ultra-Dense Het Nets with Burst Traffic 被引量:1
2
作者 Xin Liu Zhiwen Pan +1 位作者 Nan Liu Xiaohu You 《China Communications》 SCIE CSCD 2016年第9期24-32,共9页
SINR distribution and rate overage distribution are crucial for optimization of deployment of Ultra-dense Het Nets.Most existing literatures assume that BSs have full queues and full-buffer traffic.In fact,due to ultr... SINR distribution and rate overage distribution are crucial for optimization of deployment of Ultra-dense Het Nets.Most existing literatures assume that BSs have full queues and full-buffer traffic.In fact,due to ultra-dense deployment of small cells,traffic in small cell varies dramatically in time and space domains.Hence,it is more practical to investigate scenario with burst traffic.In this paper,we consider a two-tier non-uniform ultra-dense Het Net with burst traffic,where macro BSs are located according to Poisson Point Process(PPP),and pico BSs are located according to Poisson Hole Process(PHP).The closed-form expressions of SINR distribution and rate distribution are derived,and then validated through simulation.Our study shows that different from the result of full buffer case,the SINR distribution and rate distribution of users depend on the average transmission probabilities of BSs in burst traffic case. 展开更多
关键词 Ultra-dense HetNet SINR and rate distribution stochastic geometry burst traffic non-uniform network
在线阅读 下载PDF
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission
3
作者 Ziyang XING Xiaoqiang DI +9 位作者 Hui QI Jing CHEN Jinhui CAO Jinyao LIU Xusheng LI Zichu ZHANG Yuchen ZHU Lei CHEN Kai HUANG Xinghan HUO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第6期791-808,共18页
Information-centric satellite networks play a crucial role in remote sensing applications,particularly in the transmission of remote sensing images.However,the occurrence of burst traffic poses significant challenges ... Information-centric satellite networks play a crucial role in remote sensing applications,particularly in the transmission of remote sensing images.However,the occurrence of burst traffic poses significant challenges in meeting the increased bandwidth demands.Traditional content delivery networks are ill-equipped to handle such bursts due to their pre-deployed content.In this paper,we propose an optimal replication strategy for mitigating burst traffic in information-centric satellite networks,specifically focusing on the transmission of remote sensing images.Our strategy involves selecting the most optimal replication delivery satellite node when multiple users subscribe to the same remote sensing content within a short time,effectively reducing network transmission data and preventing throughput degradation caused by burst traffic expansion.We formulate the content delivery process as a multi-objective optimization problem and apply Markov decision processes to determine the optimal value for burst traffic reduction.To address these challenges,we leverage federated reinforcement learning techniques.Additionally,we use bloom filters with subdivision and data identification methods to enable rapid retrieval and encoding of remote sensing images.Through software-based simulations using a low Earth orbit satellite constellation,we validate the effectiveness of our proposed strategy,achieving a significant 17%reduction in the average delivery delay.This paper offers valuable insights into efficient content delivery in satellite networks,specifically targeting the transmission of remote sensing images,and presents a promising approach to mitigate burst traffic challenges in information-centric environments. 展开更多
关键词 Information-centric satellite network Burst traffic Content delivery Federated reinforcement learning Mixed-integer linear programming model Bloom filter Dynamic network
原文传递
Performance analysis of optical burst switching under bursty traffic
4
作者 陈春汉 曹明翠 罗志详 《Chinese Optics Letters》 SCIE EI CAS CSCD 2004年第1期21-23,共3页
The performance of the algorithm of the data channel scheduling algorithm of latest available unscheduled channel with void filling (LAUC-VF) under bursty traffic is presented firstly. A bursty traffic model for optic... The performance of the algorithm of the data channel scheduling algorithm of latest available unscheduled channel with void filling (LAUC-VF) under bursty traffic is presented firstly. A bursty traffic model for optical burst switch performance simulation is also introduced. 展开更多
关键词 Performance analysis of optical burst switching under bursty traffic OBS LINE FDL LENGTH
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部