Skip to main content

Showing 1–5 of 5 results for author: Čejka, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.05530  [pdf, other

    cs.NI cs.LG

    NetTiSA: Extended IP Flow with Time-series Features for Universal Bandwidth-constrained High-speed Network Traffic Classification

    Authors: Josef Koumar, Karel Hynek, Jaroslav Pešek, Tomáš Čejka

    Abstract: Network traffic monitoring based on IP Flows is a standard monitoring approach that can be deployed to various network infrastructures, even the large IPS-based networks connecting millions of people. Since flow records traditionally contain only limited information (addresses, transport ports, and amount of exchanged data), they are also commonly extended for additional features that enable netwo… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

    Comments: Submitted to The International Journal of Computer and Telecommunications Networking

  2. arXiv:2307.13434  [pdf, other

    cs.LG cs.NI

    Network Traffic Classification based on Single Flow Time Series Analysis

    Authors: Josef Koumar, Karel Hynek, Tomáš Čejka

    Abstract: Network traffic monitoring using IP flows is used to handle the current challenge of analyzing encrypted network communication. Nevertheless, the packet aggregation into flow records naturally causes information loss; therefore, this paper proposes a novel flow extension for traffic features based on the time series analysis of the Single Flow Time series, i.e., a time series created by the number… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Submitted to The 19th International Conference on Network and Service Management (CNSM) 2023

  3. arXiv:2211.08399  [pdf, other

    cs.NI cs.AI cs.LG

    Active Learning Framework to Automate NetworkTraffic Classification

    Authors: Jaroslav Pešek, Dominik Soukup, Tomáš Čejka

    Abstract: Recent network traffic classification methods benefitfrom machine learning (ML) technology. However, there aremany challenges due to use of ML, such as: lack of high-qualityannotated datasets, data-drifts and other effects causing aging ofdatasets and ML models, high volumes of network traffic etc. Thispaper argues that it is necessary to augment traditional workflowsof ML training&deployment and… ▽ More

    Submitted 26 October, 2022; originally announced November 2022.

  4. Fine-grained TLS services classification with reject option

    Authors: Jan Luxemburk, Tomáš Čejka

    Abstract: The recent success and proliferation of machine learning and deep learning have provided powerful tools, which are also utilized for encrypted traffic analysis, classification, and threat detection in computer networks. These methods, neural networks in particular, are often complex and require a huge corpus of training data. Therefore, this paper focuses on collecting a large up-to-date dataset w… ▽ More

    Submitted 29 November, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

    Journal ref: Computer Networks, vol. 220, p. 109467, Jan. 2023

  5. arXiv:2107.04436  [pdf, other

    cs.CR cs.NI

    Large Scale Measurement on the Adoption of Encrypted DNS

    Authors: Sebastián García, Karel Hynek, Dmtrii Vekshin, Tomáš Čejka, Armin Wasicek

    Abstract: Several encryption proposals for DNS have been presented since 2016, but their adoption was not comprehensively studied yet. This research measured the current adoption of DoH (DNS over HTTPS), DoT (DNS over TLS), and DoQ (DNS over QUIC) for five months at the beginning of 2021 by three different organizations with global coverage. By comparing the total values, amount of requests per user, and th… ▽ More

    Submitted 9 July, 2021; originally announced July 2021.

    Comments: 16 pages, 10 figures

    ACM Class: C.2.0; C.2.2