{"id":"https://openalex.org/W4299992996","doi":"https://doi.org/10.1145/3538969.3544473","title":"Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion","display_name":"Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion","publication_year":2022,"publication_date":"2022-08-17","ids":{"openalex":"https://openalex.org/W4299992996","doi":"https://doi.org/10.1145/3538969.3544473"},"language":"en","primary_location":{"id":"doi:10.1145/3538969.3544473","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544473","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088930828","display_name":"Georgios Agrafiotis","orcid":"https://orcid.org/0009-0001-4104-8380"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Georgios Agrafiotis","raw_affiliation_strings":["Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece"],"affiliations":[{"raw_affiliation_string":"Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088625984","display_name":"Eftychia Makri","orcid":"https://orcid.org/0009-0003-0469-4812"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Eftychia Makri","raw_affiliation_strings":["Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece"],"affiliations":[{"raw_affiliation_string":"Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053652363","display_name":"Ioannis Flionis","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Flionis","raw_affiliation_strings":["Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece"],"affiliations":[{"raw_affiliation_string":"Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051582957","display_name":"Antonios Lalas","orcid":"https://orcid.org/0000-0002-5337-161X"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Antonios Lalas","raw_affiliation_strings":["Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece"],"affiliations":[{"raw_affiliation_string":"Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064307246","display_name":"Konstantinos Votis","orcid":"https://orcid.org/0000-0001-6381-8326"},"institutions":[{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]},{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Konstantinos Votis","raw_affiliation_strings":["Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece"],"affiliations":[{"raw_affiliation_string":"Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087452615","display_name":"Dimitrios Tzovaras","orcid":"https://orcid.org/0000-0001-6915-6722"},"institutions":[{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]},{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dimitrios Tzovaras","raw_affiliation_strings":["Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece"],"affiliations":[{"raw_affiliation_string":"Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088930828"],"corresponding_institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"],"apc_list":null,"apc_paid":null,"fwci":2.7137,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.92054911,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8448301553726196},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6857016086578369},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6078122854232788},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5423610210418701},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.531963586807251},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.49262458086013794},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.4650992155075073},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4479491412639618},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4381023943424225},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.43726491928100586},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.42836111783981323},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4148368239402771},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4146319627761841},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3812065124511719},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.22980958223342896},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15059897303581238}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8448301553726196},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6857016086578369},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6078122854232788},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5423610210418701},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.531963586807251},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.49262458086013794},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.4650992155075073},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4479491412639618},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4381023943424225},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.43726491928100586},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.42836111783981323},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4148368239402771},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4146319627761841},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3812065124511719},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.22980958223342896},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15059897303581238},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3538969.3544473","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3538969.3544473","pdf_url":null,"source":{"id":"https://openalex.org/S4363608926","display_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1354028503","display_name":null,"funder_award_id":"952672","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W200681053","https://openalex.org/W1501706198","https://openalex.org/W2027664152","https://openalex.org/W2041855183","https://openalex.org/W2050918226","https://openalex.org/W2200832203","https://openalex.org/W2606697812","https://openalex.org/W2789828921","https://openalex.org/W2970971581","https://openalex.org/W3125542973","https://openalex.org/W3200314056","https://openalex.org/W4220809157"],"related_works":["https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Traffic":[0],"categorization":[1],"is":[2,66],"considered":[3],"of":[4,44,63,69,146],"paramount":[5],"importance":[6],"in":[7,18,23,155],"the":[8,15,42,60,67,110,116,128,140,144,150,156],"network":[9,19,37,48,89,103],"security":[10],"sector,":[11],"as":[12,14,82],"well":[13],"first":[16],"stage":[17],"anomaly":[20],"detection,":[21],"or":[22],"a":[24,77,122],"network-based":[25],"intrusion":[26],"detection":[27],"system":[28],"(IDS).":[29],"This":[30,84],"paper":[31],"introduces":[32],"an":[33],"artificial":[34],"intelligence":[35],"(AI)":[36],"traffic":[38,71,90],"classification":[39,137],"pipeline,":[40],"including":[41],"employment":[43],"state-of-the-art":[45],"image-based":[46],"neural":[47],"models,":[49],"namely":[50],"Vision":[51],"Transformers":[52],"(ViT)":[53],"and":[54,96,105,119],"Convolutional":[55],"Neural":[56],"Networks":[57],"(CNN),":[58],"whereas":[59],"primary":[61],"element":[62],"this":[64],"pipeline":[65],"transformation":[68],"raw":[70],"data":[72,91],"into":[73],"grayscale":[74],"pictures":[75],"introducing":[76],"properly":[78],"developed":[79],"IDS-Vision":[80],"Toolkit":[81],"well.":[83],"approach":[85],"extracts":[86],"characteristics":[87],"from":[88],"without":[92],"requiring":[93],"domain":[94,158],"expertise":[95],"could":[97],"be":[98],"easily":[99],"adapted":[100],"to":[101,121,143,159],"new":[102],"protocols":[104],"technologies":[106],"(i.e.":[107],"5G).":[108],"Furthermore,":[109],"proposed":[111],"method":[112],"was":[113],"tested":[114],"on":[115,127],"CIC-IDS-2017":[117,141],"dataset":[118,142],"compared":[120],"well-known":[123],"feature":[124],"extraction":[125],"strategy":[126],"same":[129],"dataset.":[130],"Finally,":[131],"it":[132],"surpasses":[133],"all":[134],"suggested":[135],"binary":[136],"algorithms":[138],"for":[139,152],"best":[145],"our":[147],"knowledge,":[148],"paving":[149],"path":[151],"further":[153],"exploitation":[154],"5G":[157],"successfully":[160],"address":[161],"related":[162],"cybersecurity":[163],"challenges.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
