Encrypted traffic classification encoder based on lightweight graph representation
Abstract In recent years, traffic encryption technology has been widely adopted for user information protection, leading to a substantial increase in encrypted traffic in communication networks. To address issues such as unclear local key features and low classification accuracy in traditional malic...
| Published in: | Scientific Reports |
|---|---|
| Main Authors: | ZhenWei Chen, XiaoXu Wei, YongSheng Wang |
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2025-08-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1038/s41598-025-05225-4 |
Similar Items
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition
by: Ruipeng Yang, et al.
Published: (2022-12-01)
by: Ruipeng Yang, et al.
Published: (2022-12-01)
AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic
by: Junhao Liu, et al.
Published: (2024-11-01)
by: Junhao Liu, et al.
Published: (2024-11-01)
Malicious Encrypted Traffic Detection Method Based on Conversation Statistical Encoder Model
by: GONG Siyue, LIU Hui, WANG Baohui
Published: (2024-11-01)
by: GONG Siyue, LIU Hui, WANG Baohui
Published: (2024-11-01)
A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study
by: Soliman Abd Elmonsef Sarhan, et al.
Published: (2023-09-01)
by: Soliman Abd Elmonsef Sarhan, et al.
Published: (2023-09-01)
Semi-2DCAE: a semi-supervision 2D-CNN AutoEncoder model for feature representation and classification of encrypted traffic
by: Jun Cui, et al.
Published: (2023-11-01)
by: Jun Cui, et al.
Published: (2023-11-01)
HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications
by: Saud Alharbi, et al.
Published: (2025-06-01)
by: Saud Alharbi, et al.
Published: (2025-06-01)
<inline-formula> <tex-math notation="LaTeX">$Deep-Full-Range$ </tex-math></inline-formula>: A Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework
by: Yi Zeng, et al.
Published: (2019-01-01)
by: Yi Zeng, et al.
Published: (2019-01-01)
Learning compact graph representations via an encoder-decoder network
by: John Boaz Lee, et al.
Published: (2019-07-01)
by: John Boaz Lee, et al.
Published: (2019-07-01)
Encrypted traffic classification method based on parallel traffic graph and graph neural network
by: LIU Taotao, et al.
Published: (2025-06-01)
by: LIU Taotao, et al.
Published: (2025-06-01)
Matrix Encryption Walks for Lightweight Cryptography
by: Aeryn Dunmore, et al.
Published: (2023-08-01)
by: Aeryn Dunmore, et al.
Published: (2023-08-01)
Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
by: Abebe Diro, et al.
Published: (2020-01-01)
by: Abebe Diro, et al.
Published: (2020-01-01)
Accurate Encrypted Malicious Traffic Identification via Traffic Interaction Pattern Using Graph Convolutional Network
by: Guoqiang Ren, et al.
Published: (2023-01-01)
by: Guoqiang Ren, et al.
Published: (2023-01-01)
Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems
by: Mohamed Yamni, et al.
Published: (2025-09-01)
by: Mohamed Yamni, et al.
Published: (2025-09-01)
Modification Advanced Encryption Standard for Design Lightweight Algorithms
by: Soukaena Hassan, et al.
Published: (2019-05-01)
by: Soukaena Hassan, et al.
Published: (2019-05-01)
Deep Embedded Auto-encoder for End-to-End Unsupervised Image Anomaly Detection
by: Xuan Huang, et al.
Published: (2025-06-01)
by: Xuan Huang, et al.
Published: (2025-06-01)
A Co-Embedding Model with Variational Auto-Encoder for Knowledge Graphs
by: Luodi Xie, et al.
Published: (2022-01-01)
by: Luodi Xie, et al.
Published: (2022-01-01)
Application of Terminal Audio Mixing in Multi-Bandwidth End-to-End Encrypted Voice Conference
by: Chi-Hung Lien, et al.
Published: (2025-05-01)
by: Chi-Hung Lien, et al.
Published: (2025-05-01)
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption
by: Shi Lin, et al.
Published: (2024-01-01)
by: Shi Lin, et al.
Published: (2024-01-01)
Dual-Stream Time-Series Transformer-Based Encrypted Traffic Data Augmentation Framework
by: Daeho Choi, et al.
Published: (2025-09-01)
by: Daeho Choi, et al.
Published: (2025-09-01)
A Multi-Feature Semantic Fusion Machine Learning Architecture for Detecting Encrypted Malicious Traffic
by: Shiyu Tang, et al.
Published: (2025-07-01)
by: Shiyu Tang, et al.
Published: (2025-07-01)
Multi-Level Pre-Training for Encrypted Network Traffic Classification
by: Jee-Tae Park, et al.
Published: (2025-01-01)
by: Jee-Tae Park, et al.
Published: (2025-01-01)
A lightweight framework for knowledge graph representation learning models based on knowledge distillation strategy
by: Qiuhui Shen, et al.
Published: (2025-09-01)
by: Qiuhui Shen, et al.
Published: (2025-09-01)
On cryptographic security of end-to-end encrypted connections in WhatsApp and Telegram messengers
by: Sergey V. Zapechnikov, et al.
Published: (2017-11-01)
by: Sergey V. Zapechnikov, et al.
Published: (2017-11-01)
Study on SSL/TLS Encrypted Malicious Traffic Detection Algorithm Based on Graph Neural Networks
by: TANG Ying, WANG Baohui
Published: (2024-09-01)
by: TANG Ying, WANG Baohui
Published: (2024-09-01)
Trusted data flow traceability mechanism for end-to-end encrypted instant messaging platforms
by: XIE Rongna, et al.
Published: (2025-08-01)
by: XIE Rongna, et al.
Published: (2025-08-01)
An Experimental Study on State Representation Extraction for Vision-Based Deep Reinforcement Learning
by: Junkai Ren, et al.
Published: (2021-11-01)
by: Junkai Ren, et al.
Published: (2021-11-01)
Disrupting violence while preserving encryption
by: Eva Nave, et al.
Published: (2024-04-01)
by: Eva Nave, et al.
Published: (2024-04-01)
Predicate encryption against master-key tampering attacks
by: Yuejun Liu, et al.
Published: (2019-08-01)
by: Yuejun Liu, et al.
Published: (2019-08-01)
A lightweight end to end traffic congestion detection framework using HRTNet on the Qinghai Tibet plateau
by: Yuhao Zhang, et al.
Published: (2025-08-01)
by: Yuhao Zhang, et al.
Published: (2025-08-01)
JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things
by: Junhyeok Yun, et al.
Published: (2020-06-01)
by: Junhyeok Yun, et al.
Published: (2020-06-01)
Ensemble graph auto-encoders for clustering and link prediction
by: Chengxin Xie, et al.
Published: (2025-01-01)
by: Chengxin Xie, et al.
Published: (2025-01-01)
End-to-End Event Factuality Identification with Joint Model
by: CAO Jinjuan, QIAN Zhong, LI Peifeng
Published: (2023-02-01)
by: CAO Jinjuan, QIAN Zhong, LI Peifeng
Published: (2023-02-01)
Designing low-power encryption algorithms for end-to-end vehicular data protection in sustainable IoT networks
by: D. Sudha, et al.
Published: (2025-12-01)
by: D. Sudha, et al.
Published: (2025-12-01)
Data Security in Cloud Environment Using Cryptography Technique for End-to-End Encryption
by: Badhan Akash, et al.
Published: (2024-01-01)
by: Badhan Akash, et al.
Published: (2024-01-01)
Graph-based prediction of Protein-protein interactions with attributed signed graph embedding
by: Fang Yang, et al.
Published: (2020-07-01)
by: Fang Yang, et al.
Published: (2020-07-01)
Graph Representation Learning and Its Applications: A Survey
by: Van Thuy Hoang, et al.
Published: (2023-04-01)
by: Van Thuy Hoang, et al.
Published: (2023-04-01)
Self-Supervised Latent Representations of Network Flows and Application to Darknet Traffic Classification
by: Mehdi Zakroum, et al.
Published: (2023-01-01)
by: Mehdi Zakroum, et al.
Published: (2023-01-01)
Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
by: Mohammad Kamrul Hasan, et al.
Published: (2021-01-01)
by: Mohammad Kamrul Hasan, et al.
Published: (2021-01-01)
The application and research of machine learning in malicious encrypted traffic detection
by: Tian Rui, et al.
Published: (2025-04-01)
by: Tian Rui, et al.
Published: (2025-04-01)
A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption
by: Cemile İnce, et al.
Published: (2024-10-01)
by: Cemile İnce, et al.
Published: (2024-10-01)
Similar Items
-
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition
by: Ruipeng Yang, et al.
Published: (2022-12-01) -
AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic
by: Junhao Liu, et al.
Published: (2024-11-01) -
Malicious Encrypted Traffic Detection Method Based on Conversation Statistical Encoder Model
by: GONG Siyue, LIU Hui, WANG Baohui
Published: (2024-11-01) -
A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study
by: Soliman Abd Elmonsef Sarhan, et al.
Published: (2023-09-01) -
Semi-2DCAE: a semi-supervision 2D-CNN AutoEncoder model for feature representation and classification of encrypted traffic
by: Jun Cui, et al.
Published: (2023-11-01)
