{"id":"https://openalex.org/W4417102171","doi":"https://doi.org/10.48550/arxiv.2508.02031","title":"PRIME: Plasticity-Robust Incremental Model for Encrypted Traffic Classification in Dynamic Network Environments","display_name":"PRIME: Plasticity-Robust Incremental Model for Encrypted Traffic Classification in Dynamic Network Environments","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4417102171","doi":"https://doi.org/10.48550/arxiv.2508.02031"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2508.02031","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.02031","pdf_url":"https://arxiv.org/pdf/2508.02031","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2508.02031","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100393510","display_name":"Tian Qin","orcid":"https://orcid.org/0009-0003-5565-6744"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qin, Tian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101688179","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0002-7874-9404"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cheng, Guang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679784","display_name":"Zihan Chen","orcid":"https://orcid.org/0000-0001-5871-7766"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Zihan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5077862885","display_name":"Yuyang Zhou","orcid":"https://orcid.org/0000-0001-8626-0468"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhou, Yuyang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100393510"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9496999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9496999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.02329999953508377,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6383000016212463},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4991999864578247},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.48559999465942383},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4839000105857849},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.37880000472068787},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3743000030517578},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.3727000057697296},{"id":"https://openalex.org/keywords/prime","display_name":"Prime (order theory)","score":0.34940001368522644},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.34599998593330383}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7069000005722046},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6383000016212463},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4991999864578247},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.48559999465942383},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4839000105857849},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4629000127315521},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.446399986743927},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4081000089645386},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.37880000472068787},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3743000030517578},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3727000057697296},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.34940001368522644},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.34599998593330383},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.3456000089645386},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.3411000072956085},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3384999930858612},{"id":"https://openalex.org/C2780735816","wikidata":"https://www.wikidata.org/wiki/Q28324931","display_name":"Incremental learning","level":2,"score":0.3312999904155731},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3292999863624573},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.3248000144958496},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3215000033378601},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.31769999861717224},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.3075000047683716},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.25450000166893005},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2508.02031","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.02031","pdf_url":"https://arxiv.org/pdf/2508.02031","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2508.02031","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.02031","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2508.02031","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.02031","pdf_url":"https://arxiv.org/pdf/2508.02031","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,43,62,115,120,127,132,138,142,159],"continuous":[2],"development":[3],"of":[4,45,58,64,123,129],"network":[5,31],"environments":[6],"and":[7,12,27,39,67,113,126,154],"technologies,":[8],"ensuring":[9],"cyber":[10],"security":[11],"governance":[13],"is":[14],"increasingly":[15],"challenging.":[16],"Network":[17],"traffic":[18,46,111,152],"classification(ETC)":[19],"can":[20,135],"analyzes":[21],"attributes":[22],"such":[23],"as":[24,97],"application":[25],"categories":[26],"malicious":[28],"intent,":[29],"supporting":[30],"management":[32],"services":[33,66],"like":[34],"QoS":[35],"optimization,":[36],"intrusion":[37],"detection,":[38],"targeted":[40],"billing.":[41],"As":[42],"prevalence":[44],"encryption":[47],"increases,":[48],"deep":[49],"learning":[50,83,107,168],"models":[51],"are":[52,85],"relied":[53],"upon":[54],"for":[55,75],"content-agnostic":[56],"analysis":[57],"packet":[59],"sequences.":[60],"However,":[61],"emergence":[63],"new":[65],"attack":[68],"variants":[69],"often":[70],"leads":[71],"to":[72],"incremental":[73,82,106,167],"tasks":[74,98],"ETC":[76],"models.":[77],"To":[78],"ensure":[79],"model":[80,124],"effectiveness,":[81],"techniques":[84],"essential;":[86],"however,":[87],"recent":[88],"studies":[89],"indicate":[90],"that":[91,148],"neural":[92],"networks":[93],"experience":[94],"declining":[95],"plasticity":[96,102,144],"increase.":[99],"We":[100],"identified":[101],"issues":[103],"in":[104,149,173],"existing":[105],"methods":[108],"across":[109],"diverse":[110],"samples":[112],"proposed":[114],"PRIME":[116,133,160],"framework.":[117],"By":[118],"observing":[119],"effective":[121],"rank":[122],"parameters":[125],"proportion":[128],"inactive":[130],"neurons,":[131],"architecture":[134,161],"appropriately":[136],"increase":[137,172],"parameter":[139,174],"scale":[140],"when":[141],"model's":[143],"deteriorates.":[145],"Experiments":[146],"show":[147],"multiple":[150],"encrypted":[151],"datasets":[153],"different":[155],"category":[156],"increment":[157],"scenarios,":[158],"performs":[162],"significantly":[163],"better":[164],"than":[165],"other":[166],"algorithms":[169],"with":[170],"minimal":[171],"scale.":[175]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
