{"id":"https://openalex.org/W7118835450","doi":"https://doi.org/10.48550/arxiv.2601.01183","title":"Comparative Evaluation of VAE, GAN, and SMOTE for Tor Detection in Encrypted Network Traffic","display_name":"Comparative Evaluation of VAE, GAN, and SMOTE for Tor Detection in Encrypted Network Traffic","publication_year":2026,"publication_date":"2026-01-03","ids":{"openalex":"https://openalex.org/W7118835450","doi":"https://doi.org/10.48550/arxiv.2601.01183"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.01183","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01183","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.01183","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122072866","display_name":"Saravanan A","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"A, Saravanan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5120922074","display_name":"Aswani Kumar Cherukuri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cherukuri, Aswani Kumar","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5122072866"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.033399999141693115,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.002300000051036477,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6202999949455261},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5799000263214111},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5627999901771545},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5115000009536743},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4733000099658966},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47029998898506165},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4153999984264374},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.383899986743927},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.36579999327659607},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.35280001163482666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7590000033378601},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6219000220298767},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6202999949455261},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5799000263214111},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5627999901771545},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5115000009536743},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4733000099658966},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4722000062465668},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47029998898506165},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4593000113964081},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4153999984264374},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.383899986743927},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.35280001163482666},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.3472999930381775},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.3249000012874603},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3089999854564667},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.30799999833106995},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.30709999799728394},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.2973000109195709},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.29260000586509705},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.01183","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01183","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.01183","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01183","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.5010883212089539,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Encrypted":[0],"network":[1,43],"traffic":[2,65,110,174],"poses":[3],"significant":[4],"challenges":[5],"for":[6],"intrusion":[7],"detection":[8,175],"due":[9],"to":[10,33,59],"the":[11,35,52,104,140],"lack":[12,162],"of":[13,41,54],"payload":[14],"visibility,":[15],"limited":[16],"labeled":[17],"datasets,":[18],"and":[19,25,38,62,78,94,119,122,132,145],"high":[20],"class":[21,95],"imbalance":[22],"between":[23,117,143],"benign":[24],"malicious":[26],"activities.":[27],"Traditional":[28],"data":[29,138],"augmentation":[30],"methods":[31,169],"struggle":[32],"preserve":[34],"complex":[36],"temporal":[37],"statistical":[39,115],"characteristics":[40],"real":[42,118],"traffic.":[44],"To":[45],"address":[46],"these":[47],"issues,":[48],"this":[49],"work":[50],"explores":[51],"use":[53],"Generative":[55,74],"AI":[56],"(GAI)":[57],"models":[58],"synthesize":[60],"realistic":[61],"diverse":[63],"encrypted":[64,173],"traces.":[66],"We":[67,113],"evaluate":[68],"three":[69],"approaches:":[70],"Variational":[71],"Autoencoders":[72],"(VAE),":[73],"Adversarial":[75],"Networks":[76],"(GAN),":[77],"SMOTE":[79],"(Synthetic":[80],"Minority":[81],"Over-sampling":[82],"Technique),":[83],"each":[84],"integrated":[85],"with":[86,178],"a":[87],"preprocessing":[88],"pipeline":[89],"that":[90,136,167],"includes":[91],"feature":[92],"selection":[93],"balancing.":[96],"The":[97,164],"UNSW":[98],"NB-15":[99],"dataset":[100],"is":[101],"used":[102],"as":[103,111,129],"primary":[105],"benchmark,":[106],"focusing":[107],"on":[108],"Tor":[109],"anomalies.":[112],"analyze":[114],"similarity":[116],"synthetic":[120,180],"data,":[121],"assess":[123],"classifier":[124],"performance":[125],"using":[126],"metrics":[127],"such":[128],"Accuracy,":[130],"F1-score,":[131],"AUC-ROC.":[133],"Results":[134],"show":[135],"VAE-generated":[137],"provides":[139],"best":[141],"balance":[142],"privacy":[144],"performance,":[146],"while":[147],"GANs":[148],"offer":[149],"higher":[150],"fidelity":[151],"but":[152,160],"risk":[153],"overfitting.":[154],"SMOTE,":[155],"though":[156],"simple,":[157],"enhances":[158],"recall":[159],"may":[161],"diversity.":[163],"findings":[165],"demonstrate":[166],"GAI":[168],"can":[170],"significantly":[171],"improve":[172],"when":[176],"trained":[177],"privacy-preserving":[179],"data.":[181]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
