Application Layer Protocol Identification Method Based on ResNet

Most network attacks occur at the application layer, where many application layer protocols exist. These protocols have different structures and functionalities, posing feature extraction challenges and resulting in low identification accuracy. This significantly affects application layer protocol r...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhijian Fang, Xiang Gao, Huaxiong Zhang, Jingpeng Tang, Qiang Gao
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Algorithms
Subjects:
Online Access:https://www.mdpi.com/1999-4893/18/1/52
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items