{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:22:18Z","timestamp":1730326938677,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607206","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"297-314","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9815-0829","authenticated-orcid":false,"given":"Zijun","family":"Hang","sequence":"first","affiliation":[{"name":"National University of Defense Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8502-9907","authenticated-orcid":false,"given":"Yuliang","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2055-3799","authenticated-orcid":false,"given":"Yongjie","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7539-919X","authenticated-orcid":false,"given":"Yi","family":"Xie","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991123"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2020.07.010"},{"key":"e_1_3_2_1_3_1","first-page":"38","article-title":"Machine learning and data mining methods for cybersecurity","volume":"4","author":"Barreno Marco","year":"2006","unstructured":"Marco Barreno, Blaine Nelson, Russell Sears, Anthony\u00a0D Joseph, and J\u00a0Doug Tygar. 2006. Machine learning and data mining methods for cybersecurity. IEEE Security & Privacy 4, 2 (2006), 38\u201349.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162704"},{"volume-title":"Language models are few-shot learners. Advances in neural information processing systems 33","year":"2020","author":"Brown Tom","key":"e_1_3_2_1_6_1","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared\u00a0D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020), 1877\u20131901."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","year":"2018","author":"Devlin Jacob","key":"e_1_3_2_1_8_1","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"volume-title":"An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929","year":"2020","author":"Dosovitskiy Alexey","key":"e_1_3_2_1_9_1","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"volume-title":"Autogluon-tabular: Robust and accurate automl for structured data. arXiv preprint arXiv:2003.06505","year":"2020","author":"Erickson Nick","key":"e_1_3_2_1_11_1","unstructured":"Nick Erickson, Jonas Mueller, Alexander Shirkov, Hang Zhang, Pedro Larroy, Mu Li, and Alexander Smola. 2020. Autogluon-tabular: Robust and accurate automl for structured data. arXiv preprint arXiv:2003.06505 (2020)."},{"volume-title":"Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:2301.13686","year":"2023","author":"Fu Chuanpu","key":"e_1_3_2_1_12_1","unstructured":"Chuanpu Fu, Qi Li, and Ke Xu. 2023. Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis. arXiv preprint arXiv:2301.13686 (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"e_1_3_2_1_14_1","unstructured":"Jamie Hayes and George Danezis. [n. d.]. K-Fingerprinting: A Robust Scalable Website Fingerprinting Technique. ([n. d.]) 18."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Hong\u00a0Ye He Zhi Guo\u00a0Yang and Xiang\u00a0Ning Chen. 2020. PERT: Payload Encoding Representation from Transformer for Encrypted Traffic Classification. In 2020 ITU Kaleidoscope: Industry-Driven Digital Transformation (ITU K). 1\u20138. https:\/\/doi.org\/10.23919\/ITUK50268.2020.9303204","DOI":"10.23919\/ITUK50268.2020.9303204"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"volume-title":"Distilling the Knowledge in a Neural Network. ArXiv abs\/1503.02531","year":"2015","author":"Hinton E.","key":"e_1_3_2_1_17_1","unstructured":"Geoffrey\u00a0E. Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. ArXiv abs\/1503.02531 (2015)."},{"volume-title":"Universal language model fine-tuning for text classification. arXiv preprint arXiv:1801.06146","year":"2018","author":"Howard Jeremy","key":"e_1_3_2_1_18_1","unstructured":"Jeremy Howard and Sebastian Ruder. 2018. Universal language model fine-tuning for text classification. arXiv preprint arXiv:1801.06146 (2018)."},{"key":"e_1_3_2_1_19_1","unstructured":"F IBM\u00a0Security. 2020. Cost of a data breach report. https:\/\/www.ibm.com\/reports\/data-breach"},{"key":"e_1_3_2_1_20_1","unstructured":"DPDK Intel. 2014. Data plane development kit. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/topic-technology\/networking\/dpdk.html"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130156"},{"volume-title":"Albert: A lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942","year":"2019","author":"Lan Zhenzhong","key":"e_1_3_2_1_22_1","unstructured":"Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. 2019. Albert: A lite bert for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942 (2019)."},{"volume-title":"Ali\u00a0A Ghorbani","year":"2017","author":"Lashkari Arash\u00a0Habibi","key":"e_1_3_2_1_23_1","unstructured":"Arash\u00a0Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful\u00a0Islam Mamun, Ali\u00a0A Ghorbani, 2017. Characterization of tor traffic using time based features.. In ICISSp. 253\u2013262."},{"key":"e_1_3_2_1_24_1","first-page":"2","article-title":"Machine learning for network anomaly detection: A survey","volume":"151","author":"Le D","year":"2019","unstructured":"Ninh\u00a0D Le, Van-Nam Huynh, Tuan-Anh Thai, Dusit Niyato, and Ping Wang. 2019. Machine learning for network anomaly detection: A survey. Computer Networks 151 (2019), 2\u201320.","journal-title":"Computer Networks"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36708-4_29"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107974"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"volume-title":"Improving intrusion detection performance using keyword selection and neural networks. Computer networks 34, 4","year":"2000","author":"Lippmann P","key":"e_1_3_2_1_28_1","unstructured":"Richard\u00a0P Lippmann and Robert\u00a0K Cunningham. 2000. Improving intrusion detection performance using keyword selection and neural networks. Computer networks 34, 4 (2000), 597\u2013603."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"e_1_3_2_1_30_1","first-page":"2289","article-title":"Network traffic classification using correlation information","volume":"12","author":"Liu Cheng","year":"2017","unstructured":"Cheng Liu, Yao Zhou, Changsheng Xu, and Lionel\u00a0M Ni. 2017. Network traffic classification using correlation information. IEEE Transactions on Information Forensics and Security 12 (2017), 2289\u20132302.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3098157"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_34_1","unstructured":"pytorch. 2022. GETTING STARTED WITH DISTRIBUTED DATA PARALLEL. https:\/\/pytorch.org\/tutorials\/intermediate\/ddp_tutorial.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13200"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09655-7"},{"volume-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1","year":"2018","author":"Sharafaldin Iman","key":"e_1_3_2_1_38_1","unstructured":"Iman Sharafaldin, Arash\u00a0Habibi Lashkari, and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1 (2018), 108\u2013116."},{"key":"e_1_3_2_1_39_1","first-page":"663","article-title":"Machine learning-based detection of network anomalies: A survey","volume":"21","author":"Sharma Manoj","year":"2019","unstructured":"Manoj Sharma, Arun\u00a0Kumar Singh, Aditya Vashist, Anurag Sharma, and Manoj Nigam. 2019. Machine learning-based detection of network anomalies: A survey. IEEE Communications Surveys & Tutorials 21, 1 (2019), 663\u2013706.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050608"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -","volume":"1","author":"Socher Richard","year":"2013","unstructured":"Richard Socher, Milind Ganjoo, Christopher\u00a0D. Manning, and Andrew\u00a0Y. Ng. 2013. Zero-Shot Learning through Cross-Modal Transfer. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 1 (Lake Tahoe, Nevada) (NIPS\u201913). Curran Associates Inc., Red Hook, NY, USA, 935\u2013943."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/645496.657884"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737970"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"volume-title":"Attention is all you need. Advances in neural information processing systems 30","year":"2017","author":"Vaswani Ashish","key":"e_1_3_2_1_48_1","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"volume-title":"Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur) 53, 3","year":"2020","author":"Wang Yaqing","key":"e_1_3_2_1_51_1","unstructured":"Yaqing Wang, Quanming Yao, James\u00a0T Kwok, and Lionel\u00a0M Ni. 2020. Generalizing from a few examples: A survey on few-shot learning. ACM computing surveys (csur) 53, 3 (2020), 1\u201334."},{"volume-title":"Zero-shot learning\u2014a comprehensive evaluation of the good, the bad and the ugly","year":"2018","author":"Xian Yongqin","key":"e_1_3_2_1_52_1","unstructured":"Yongqin Xian, Christoph\u00a0H Lampert, Bernt Schiele, and Zeynep Akata. 2018. Zero-shot learning\u2014a comprehensive evaluation of the good, the bad and the ugly. IEEE transactions on pattern analysis and machine intelligence 41, 9 (2018), 2251\u20132265."},{"volume-title":"A comprehensive survey on pretrained foundation models: A history from bert to chatgpt. arXiv preprint arXiv:2302.09419","year":"2023","author":"Zhou Ce","key":"e_1_3_2_1_53_1","unstructured":"Ce Zhou, Qian Li, Chen Li, Jun Yu, Yixin Liu, Guangjing Wang, Kai Zhang, Cheng Ji, Qiben Yan, Lifang He, 2023. A comprehensive survey on pretrained foundation models: A history from bert to chatgpt. arXiv preprint arXiv:2302.09419 (2023)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:26:57Z","timestamp":1729074417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":54,"alternative-id":["10.1145\/3607199.3607206","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607206","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}