File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

박새롬

Park, Saerom
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.number 674 -
dc.citation.startPage 674 -
dc.citation.title CLUSTER COMPUTING -
dc.citation.volume 28 -
dc.contributor.author Kim, Seongmin -
dc.contributor.author Park, Saerom -
dc.contributor.author Lim, Yeon-sup -
dc.date.accessioned 2025-09-15T09:00:00Z -
dc.date.available 2025-09-15T09:00:00Z -
dc.date.created 2025-09-13 -
dc.date.issued 2025-09 -
dc.description.abstract Traffic classification is critical for network security, particularly in identifying and mitigating malicious network attacks. With the rapid progress of network technologies, the emergence of new types of network applications (unseen applications) can pose significant challenges to traffic classification methods. Additionally, the increasing prevalence of encrypted traffic due to concerns about privacy and data security further complicates the detection of unprecedented and unseen cyberattacks. Although machine learning-based approaches have demonstrated enhanced accuracy in handling complicated network patterns, identifying unseen attacks primarily relies on unsupervised methods or limited observations of new attack examples. We introduce a novel approach that combines hierarchical traffic classification with outlier exposure techniques (HACOE) to address these challenges. This approach enables the identification of unseen attacks without the need for prior exposure to specific attack data. By enhancing the calibration of neural network confidence through outlier exposure, HACOE distinguishes unseen attacks as a separate class while identifying benign and known attack types. Our experimental results show the effectiveness of HACOE in detecting unseen attacks; HACOE identifies up to 50% of unseen attacks while incorrectly classifying only 4-18% of benign instances as unseen. In addition, under the same setting for the existing zero-day detection baselines, HACOE demonstrates better or comparable performance while providing accurate classification results for known attacks. -
dc.identifier.bibliographicCitation CLUSTER COMPUTING, v.28, no.674, pp.674 -
dc.identifier.doi 10.1007/s10586-025-05396-9 -
dc.identifier.issn 1386-7857 -
dc.identifier.scopusid 2-s2.0-105015059769 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/87986 -
dc.identifier.wosid 001563368800034 -
dc.language 영어 -
dc.publisher SPRINGER -
dc.title HACOE: hierarchical attack classification with outlier exposure -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Information SystemsComputer Science, Theory & Methods -
dc.relation.journalResearchArea Computer Science -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Network anomaly detectionNetwork traffic classificationOut-of-distribution detectionOutlier exposure -
dc.subject.keywordPlus ENCRYPTED TRAFFIC CLASSIFICATIONINTRUSION -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.