Security and Communication Networks

Intelligent Network Traffic Analysis


Publishing date
01 May 2022
Status
Closed
Submission deadline
24 Dec 2021

Lead Editor

1Nanjing University of Information Science, Nanjing, China

2Nanjing University of Science, Nanjing, China

3University of Kent, Canterbury, UK

This issue is now closed for submissions.

Intelligent Network Traffic Analysis

This issue is now closed for submissions.

Description

Network traffic is the reflection of human’s activities in cyberspace - understanding how network services are used and how they are operating is critical to cyberspace governance, service optimization, and cyberthreat elimination. Network traffic analysis is central for this goal, which can help to detect network attacks, manage network resources, or improve the quality of network services.

Nevertheless, with the popularization of encrypted network protocols, and the diversity of network protocols employed in different scenarios, network traffic analysis has become a challenging field. Traditional traffic engineering requires large amounts of sophisticated expertise to deal with complicated traffic analysis tasks. More efficient traffic analysis schemes transform artificial expertise to representative models with the aid of machine learning methods and historical network traffic, deep learning specifically has been studied to solve many typical network traffic analysis tasks, which have proven to be a potential general framework for network traffic analysis. Therefore, with the increasing volume of network traffic in the high-speed network period, research on intelligent network traffic analysis is significantly important to network management and security.

The aim of this Special Issue is to provide a state-of-the-art overview of problems and solution guidelines emerging in intelligent network traffic analysis. Original research articles with a focus on both practical as well as on theoretical topics and problems, as well as review articles, are welcome.

Potential topics include but are not limited to the following:

  • Fundamental theory of network traffic analysis
  • Overall framework for network traffic analysis
  • Machine learning approach for network traffic analysis
  • Big data analysis for network traffic
  • Automated meta-data analysis of non-encrypted network traffic
  • Identification of encrypted network traffic
  • Network management with traffic analysis
  • Network attack detection with traffic analysis
  • Botnet detection with network traffic analysis
  • User behavior analysis with network traffic analysis
  • Network topology recovery with network traffic analysis
  • Traffic analysis technology for IoT devices
  • Traffic analysis technology for mobile internet
  • Network traffic analysis in 5G/B5G/6G

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 4501050
  • - Research Article

Research on Network Behavior Risk Measurement Method Based on Traffic Analysis

Qiyao Wang | Xiaolin Zhao | ... | Bin Zhao
  • Special Issue
  • - Volume 2022
  • - Article ID 4975288
  • - Research Article

A Hybrid Approach by CEEMDAN-Improved PSO-LSTM Model for Network Traffic Prediction

Bilin Shao | Dan Song | ... | Yu Zhao
  • Special Issue
  • - Volume 2022
  • - Article ID 3271433
  • - Research Article

An Efficient Method for Detecting Supernodes Using Reversible Summary Data Structures in the Distributed Monitoring Systems

Aiping Zhou | Jin Qian
  • Special Issue
  • - Volume 2022
  • - Article ID 2962318
  • - Research Article

Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples

Ziwei Zhang | Dengpan Ye
  • Special Issue
  • - Volume 2022
  • - Article ID 8486080
  • - Research Article

A Lightweight Flow Feature-Based IoT Device Identification Scheme

Ruizhong Du | Jingze Wang | Shuang Li
  • Special Issue
  • - Volume 2021
  • - Article ID 1828182
  • - Research Article

IoT-IE: An Information-Entropy-Based Approach to Traffic Anomaly Detection in Internet of Things

Yizhen Sun | Jianjiang Yu | ... | Shigeng Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 9119478
  • - Research Article

Destroy the Robust Commercial Watermark via Deep Convolutional Encoder-Decoder Network

Wei Jia | Zhiying Zhu | Huaqi Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 8267298
  • - Research Article

LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks

Ji Li | Chunxiang Gu | ... | Wenfen Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 6070451
  • - Research Article

Website Fingerprinting Attacks Based on Homology Analysis

Maohua Guo | Jinlong Fei
  • Special Issue
  • - Volume 2021
  • - Article ID 7751484
  • - Review Article

AGG: A Novel Intelligent Network Traffic Prediction Method Based on Joint Attention and GCN-GRU

Huaifeng Shi | Chengsheng Pan | ... | Xiangxiang Gu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.