Research Article

GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection

Figure 1

Traffic trajectory graph (index indicates network flow). (a): the node is the IP address, and the edge represents the network flow. (b): the node represents the network flow, and the edge represents that nodes on both ends have a common IP.