Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

ODTC: An online darknet traffic classification model based on multimodal self-attention chaotic mapping features

  • Darknet traffic classification is significantly important to network management and security. To achieve fast and accurate classification performance, this paper proposes an online classification model based on multimodal self-attention chaotic mapping features. On the one hand, the payload content of the packet is input into the network integrating CNN and BiGRU to extract local space-time features. On the other hand, the flow level abstract features processed by the MLP are introduced. To make up for the lack of the indistinct feature learning, a feature amplification module that uses logistic chaotic mapping to amplify fuzzy features is introduced. In addition, a multi-head attention mechanism is used to excavate the hidden relationships between different features. Besides, to better support new traffic classes, a class incremental learning model is developed with the weighted loss function to achieve continuous learning with reduced network parameters. The experimental results on the public CICDarketSec2020 dataset show that the accuracy of the proposed model is improved in multiple categories; however, the time and memory consumption is reduced by about 50. Compared with the existing state-of-the-art traffic classification models, the proposed model has better classification performance.

    Citation: Jiangtao Zhai, Haoxiang Sun, Chengcheng Xu, Wenqian Sun. ODTC: An online darknet traffic classification model based on multimodal self-attention chaotic mapping features[J]. Electronic Research Archive, 2023, 31(8): 5056-5082. doi: 10.3934/era.2023259

    Related Papers:

    [1] Yanfang Li, Yanmin Liu, Xianghu Liu, He Jun . On the approximate controllability for some impulsive fractional evolution hemivariational inequalities. AIMS Mathematics, 2017, 2(3): 422-436. doi: 10.3934/Math.2017.3.422
    [2] Ebrahem A. Algehyne, Abdur Raheem, Mohd Adnan, Asma Afreen, Ahmed Alamer . A study of nonlocal fractional delay differential equations with hemivariational inequality. AIMS Mathematics, 2023, 8(6): 13073-13087. doi: 10.3934/math.2023659
    [3] Yongwei Jia . Approximate controllability of evolution hemivariational inequalities under nonlocal conditions. AIMS Mathematics, 2025, 10(2): 3581-3596. doi: 10.3934/math.2025165
    [4] Yan Ning, Daowei Lu . A critical point theorem for a class of non-differentiable functionals with applications. AIMS Mathematics, 2020, 5(5): 4466-4481. doi: 10.3934/math.2020287
    [5] Chunli You, Linxin Shu, Xiao-bao Shu . Approximate controllability of second-order neutral stochastic differential evolution systems with random impulsive effect and state-dependent delay. AIMS Mathematics, 2024, 9(10): 28906-28930. doi: 10.3934/math.20241403
    [6] Ramkumar Kasinathan, Ravikumar Kasinathan, Dumitru Baleanu, Anguraj Annamalai . Well posedness of second-order impulsive fractional neutral stochastic differential equations. AIMS Mathematics, 2021, 6(9): 9222-9235. doi: 10.3934/math.2021536
    [7] Qi Wang, Chenxi Xie, Qianqian Deng, Yuting Hu . Controllability results of neutral Caputo fractional functional differential equations. AIMS Mathematics, 2023, 8(12): 30353-30373. doi: 10.3934/math.20231550
    [8] Rajesh Dhayal, Muslim Malik, Syed Abbas . Solvability and optimal controls of non-instantaneous impulsive stochastic neutral integro-differential equation driven by fractional Brownian motion. AIMS Mathematics, 2019, 4(3): 663-683. doi: 10.3934/math.2019.3.663
    [9] Chengbo Yi, Rui Guo, Jiayi Cai, Xiaohu Yan . Pinning synchronization of dynamical neural networks with hybrid delays via event-triggered impulsive control. AIMS Mathematics, 2023, 8(10): 25060-25078. doi: 10.3934/math.20231279
    [10] Gokula Nanda Chhatria . On oscillatory second order impulsive neutral difference equations. AIMS Mathematics, 2020, 5(3): 2433-2447. doi: 10.3934/math.2020161
  • Darknet traffic classification is significantly important to network management and security. To achieve fast and accurate classification performance, this paper proposes an online classification model based on multimodal self-attention chaotic mapping features. On the one hand, the payload content of the packet is input into the network integrating CNN and BiGRU to extract local space-time features. On the other hand, the flow level abstract features processed by the MLP are introduced. To make up for the lack of the indistinct feature learning, a feature amplification module that uses logistic chaotic mapping to amplify fuzzy features is introduced. In addition, a multi-head attention mechanism is used to excavate the hidden relationships between different features. Besides, to better support new traffic classes, a class incremental learning model is developed with the weighted loss function to achieve continuous learning with reduced network parameters. The experimental results on the public CICDarketSec2020 dataset show that the accuracy of the proposed model is improved in multiple categories; however, the time and memory consumption is reduced by about 50. Compared with the existing state-of-the-art traffic classification models, the proposed model has better classification performance.



    Clarke's subdifferential operator is associated with a type of nonlinear inclusion known as hemivariational inequalities. These inequalities have applications in structural analysis and non-convex optimization. The two main types of inequality problems are variational inequalities and hemivariational inequalities. Hemivariational inequalities handle nonsmooth, nonconvex energy functions, whereas variational inequalities primarily deal with convex energy functions. In 1981, Panagiotopoulos introduced the concept of hemivariational inequality as a method to represent mechanical obstacles. Hemivariational inequalities or subdifferential inclusions can be used to model various nonsmooth contact mechanics issues involving multivalued and nonmonotone constitutive laws with boundary conditions (see [1,2,3]). Since then, numerous researchers have made significant contributions to the field of hemivariational inequalities, as seen in [4,5,6,7,8,9]. Moreover, neutral differential systems with impulsive effects have become a prominent area of research, modeling real-world processes that undergo sudden changes at specific points. This field has far-reaching applications in areas like finance, economics, mechanics, neural networks, electronics, and telecommunications. Notably, the authors of [10] investigated the controllability of nonlocal neutral differential inclusions with impulse effects. Researchers looked at the existence of impulsive multivalued neutral functional differential inclusions [11,12].

    Research on controllability in hemivariational-type systems has gained significant attention from the scientific community in recent times. Control problems have significant implications for various fields, including engineering, physics, and finance [13]. Despite the progress made, many intriguing questions and concepts remain unexplored. Notably, the authors of [14,15] established the existence of optimal control in hemivariational inequalities, while [16,17] investigated optimal control in parabolic hemivariational inequalities. Furthermore, [18,19] demonstrated the existence of optimal control in hyperbolic systems, contributing to the advancement of the field. Due to their wide application to numerous pragmatist mathematics fields, neutral systems have attracted attention recently. Neutral systems have numerous applications in various fields, including thermal expansion of materials, biological advancements, surface waves, and stretchability, which benefit from neutral systems either directly or indirectly. Additionally, researchers have extensively studied hemivariational inequalities with a neutral type in [20,21]. For further information regarding the system with hemivariational inequalities, refer to [22,23,24,25,26]. Recently, there has been a surge of interest in Clarke's subdifferential evolution inclusion problems, particularly in the context of nonsmooth analysis and optimization. Frictional contact analysis can effectively characterize the interaction between a piezoelectric body and an electrically conducting foundation, and the frictional contact between a piezoelectric cylinder and a foundation exhibits anti-plane shear deformations. Moreover, the authors of [27] have established approximate controllability results for Sobolev-type Hilfer fractional neutral evolution problems with Clarke's subdifferential-type problems. Our proposed problem presents a model that combines the key elements of hemivariational inequality and fractional impulsive differential equations into a unified framework. This study establishes approximate controllability results for a neutral differential system with impulsive effects, formulated as a hemivariational inequality. Next, we will define the specific system under consideration, which will be the focus of our investigation:

    {ddφ[u(φ)g1(φ,u(φ))]+A(φ)u(φ)+Bv(φ),ωM+H(φ,u(φ);ω)0,φiφL=[0,a],  ωM,u(0)=u0, u(0)=u1,Δu(φi)=Li(u(φi)),Δu(φi)=Ki(u(φi)), i=1,2,3,...,m, 0<φ1<φ2<...<φm<a. (1.1)

    Here ,M stands for the inner product of the separable Hilbert space M and A:D(A)MM is a closed, linear, and densely defined operator on M. H(φ,;) denotes the generalized Clarke's directional derivative [6] of a locally Lipschitz function H(φ,):MR. The function g1:L×MM. The control function vV takes values from L2(L,V) and V is the control set which is also a Hilbert space. Let B:VM be the bounded linear operator. Let 0<φ1<φ2<...<φm<φm+1=a be pre-fixed points and the symbol Δu(φi) represents the jump in the state u at time t which is defined by Δu(φi)=u(φ+i)u(φi), and u(φi) and u(φ+i) denote the left and right limit of u at φi. Li:MM and Ki:MM,i=1,2,3,...,m, are impulsive functions.

    The structure of the article is presented in the following way:

    ● We begin by reviewing key definitions, fundamental theorems, and initial findings from a previous section.

    ● The core focus then shifts to exploring the existence of mild solutions for the system represented by Eq (1.1).

    ● Next, we investigate the approximate controllability of the system (1.1).

    ● Finally, we solidify our theoretical results by presenting a concrete example.

    Let Z and Z be a Banach space and its dual, respectively with Z and , is the duality pairing of Z and Z. The Banach space PC(L,Z) is the set of all piecewise continuous functions from L=[0,a] into Z together with uPC=supφLu(φ)Z. Also,

    M(w)k(e)(Z):={Z: is (weakly) compact (convex)};Mf(e)(Z):={Z: is closed (convex)}.

    Consider the non-autonomous second-order initial value problem:

    z(φ)= A(φ)z(φ)+f(φ),0z,φa, (2.1)
    z(z)= z0,z(z)=z1, (2.2)

    where A(φ):D(A(φ))MM, φ[0,a] is a closed densely defined operator and f:[0,a]M is an appropriate function. One can refer to [15,28,29,30] and the references therein. A significant number of articles relate the existence of solutions to the (2.1)-(2.2) problem to the existence of the evolution operator Q(φ,z) for the homogeneous equation

    z(φ)= A(φ)z(φ),0φa. (2.3)

    Assume that the domain of A(φ) is a subspace D that is dense in M and independent of φ, and that the function φA(φ)z is continuous for each zD(A(φ)).

    In view of Kozak's work [31], we shall apply the following evolution operator notion in this study.

    Definition 2.1. A family Q of bounded linear operators Q(φ,z):[0,a]×[0,a]L(M) is called an evolution operator for (2.3) if the following conditions are satisfied:

    (Z1) For each zM, the mapping [0,a]×[0,a](φ,z)Q(φ,z)zM is of class C1 and

    (i) for each φ[0,a], Q(φ,φ)=0,

    (ii) for all φ,z[0,a], and for each zM,

    φQ(φ,z)z|φ=z=z,zQ(φ,z)z|φ=z=z.

    (Z2) For all φ,z[0,a], if zD(A), then Q(φ,z)zD(A), the mapping [0,a]×[0,a](φ,z)Q(φ,z)zM is of class C2 and

    (i) 2φ2Q(φ,z)z=A(φ)Q(φ,z)z,

    (ii) 2z2Q(φ,z)z=Q(φ,z)B(z)z,

    (iii) zφQ(φ,z)z|φ=z=0.

    (Z3) For all φ,z[0,a], if zD(A), and then zQ(φ,z)zD(A), then 2φ2zQ(φ,z)z, 2z2φQ(φ,z)z, and

    (i) 2φ2zQ(φ,z)z=A(φ)zQ(φ,z)z,

    (ii) 2z2φQ(φ,z)z=φQ(φ,z)A(z)z,

    and the mapping [0,a]×[0,a](φ,z)A(φ)zQ(φ,z)z is continuous.

    Let us take

    C(φ,z)=Q(φ,z)z.

    Also, for some positive constants N1 and N2, we set sup0φ,zaQ(φ,z)N2 and sup0φ,zaC(φ,z)N1 and

    Q(φ+g,z)Q(φ,z)N1|g|, (2.4)

    for all z,φ,φ+g[0,a]. The mild solution z:[0,a]M of (2.1)-(2.2) is:

    z(φ)=C(φ,z)z0+Q(φ,z)z1+φ0Q(φ,η)f(η)dη.

    Let us start by discussing the necessary definitions and findings from the multivalued analysis. The following sources [7,32,33] are recommended for readers in addition to multivalued maps.

    Definition 2.2. Given a Banach space Z and a multivalued map H:Z2Z{}=N(Z), we say

    (i) H is convex and closed valued, only when H(u) is convex and closed valued for all uZ.

    (ii) H is said to be upper semicontinuous on Z, if for all yZ, H(u) is closed in Z and if for each open set J1 of Z which contains H(u), then there is an open neighborhood E of u such that H(E)J1.

    (iii) H is bounded on bounded sets if H(B)=uBH(u) is bounded in Z for all BMb(Z) (i.e., supuB{sup{k:kH(u)}}<).

    (iv) H is supposed to be completely continuous provided that H(J1) is relatively compact, for all bounded subset J1Z.

    (v) H has a fixed point if there is a uZ such that uH(u).

    For a locally Lipschitzian functional H:ZR, we denote H0(q;p), the Clarke's generalized directional derivative of H at point q in the direction of p, that is,

    H0(q;p):=limγ0+supϑqH(ϑ+γp)H(ϑ)γ.

    Also, H(q):={qZ:H0(q;p)q;p,for every pZ} denotes the generalized Clarke's subdifferential.

    The subsequent features and outcomes will facilitate our goal achievement:

    Lemma 2.3. [9] If the function H:R is a locally Lipschitz on an open set of Z, then

    (i) For all pZ, it has H0(q;p)=max{q;p: for all qH(q)};

    (ii) For all q, the gradient H(q) is a nonempty, convex, weak-compact subset of Z and qZM, for all qH(q);

    (iii) The graph of H is closed in ×Z. That is, if {qn}, {qn}Z are sequences as qnH(qn) and qnqZ, qnq weakly in Z, then qH(q) (where the Banach space Z furnished with the -topology is denoted by Z);

    (iv) The multifunction qH(q)Z is upper semicontinuous which maps into Z.

    Lemma 2.4. [9] Let Z be the separable reflexive Banach space, 0<a< and H:(0,a)×ZR, such that  H(,w) is measurable for each wZ and H(φ,) is locally Lipschitz on Z for all φ(0,a). Then the multifunction (0,a)×Z(φ,w)H(φ,w)Z is measurable.

    As discussed in [9], we can investigate the existence of mild solutions and approximate controllability for the following semilinear inclusions:

    {ddφ[z(φ)g1(φ,u(φ))]A(φ)u(φ)+Bv(φ)+H(φ,z(φ)), φL=[0,a],u(0)=u0, u(0)=u1,Δu(φi)=Li(u(φi)), Δu(φi)=Ki(u(φi)), i=1,2,3,...,m. (2.5)

    Now, we can explore the implication that every solution to Eq (2.5) is also a solution to Eq (1.1). Hence, if uPC(L,M) is a solution of (2.5), there exists h(φ)H(φ,u(φ)) provided hL2(L,M) and

    {ddφ[u(φ)g1(φ,u(φ))]=A(φ)u(φ)+Bv(φ)+h(φ), φL=[0,a],u(0)=u0, u(0)=u1,Δz(φi)=Li(u(φi)), Δu(φi)=Ki(u(φi)), i=1,2,3,...,m,

    which implies

    {ddφ[u(φ)g1(φ,u(φ))]+A(φ)u(φ)+Bv(φ),ωM+h(φ),ωM=0, φL=[0,a],for all ωM,u(0)=u0, u(0)=u1,Δz(φi)=Li(u(φi)), Δu(φi)=Ki(u(φi)), i=1,2,3,...,m.

    Since h(φ),ωMH0(φ,u(φ);ω) and h(φ)H(φ,u(φ)),

    {ddφ[u(φ)g1(φ,u(φ))]+A(φ)u(φ)+Bv(φ),ωM+ H0(φ,u(φ);ω), φL=[0,a], for all ωM,u(0)=u0, u(0)=u1,Δu(φi)=Li(u(φi)), Δu(φi)=Ki(u(φi)), i=1,2,3,...,m.

    Therefore, our initial focus will be on examining the semilinear inclusion (2.5), which proceeds our investigation of the hemivariational inequality (1.1). According to established literature [33,34], the mild solution for problem (2.5) is defined as below.

    Definition 2.5. For all vL2(L,V), a function uPC(L,M) is a mild solution for (2.5) if there exists hL2(L,M) as h(φ)H(φ,u(φ)) almost everywhere on φL,

    u(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)), φL.

    Let us take the following assumptions:

    (A1) The function H:L×MR satisfies:

    (i) uM, φH(φ,z) is measurable;

    (ii) uH(φ,u) is locally Lipschitz continuous for a.e. φL;

    (iii) There is a function b(φ)L2(L,R+) and e>0 such that

    H(φ,u)=sup{h:h(φ)H(φ,u)}b(φ)+eu,for a.e. φL and for each uM.

    (A2) In the function g1:L×MM, there exists some constants C1,C2>0, and for every uM, φ1,φ2L, we have

    g1(φ1,u(φ1))g1(φ2,u(φ2))C1u(φ1)u(φ2),g1(φ1,u(φ1))C2(1+u(φ1)).

    (A3) For some constants ci,li>0, the maps Li,Ki:MM are continuous, and

    Li(φ)ci,Ki(φ)li, i=1,2,3,...,m, for all uM.

    Let M:L2(L,M)2L2(L,M) be defined as below:

    M(u)={kL2(L,M):k(φ)H(φ,u(φ)) almost everywhere, φL}, for all uL2(L,M).

    Lemma 2.6. [35] Let (A1) and M be true. If unu in L2(L,M), wnw weakly in L2(L,M) and unM(un), and then uM(u).

    Lemma 2.7. [9] Let all hypotheses and (A1) hold. Then for every uL2(L,M), the set M(u) has nonempty, weakly compact and convex values.

    Theorem 2.8. [9] Consider the Banach space Z which is locally convex and Υ:Z2Z is a compact convex valued, upper semicontinuous multivalued map such that there exists a closed neighborhood J of 0 for which Υ(J) is relatively compact provided

    ={xZ:γxΥ(u), for some γ>1}

    is bounded. Then Υ has a fixed point.

    Theorem 3.1. For all vL2(L,V), provided that (A1)(A3) are fulfilled, then (2.5) has a mild solution on L such that a(N1C2+N2e)<1, where N1:=supφ,z[0,a]C(φ,z), N2:=supφ,z[0,a]Q(φ,z).

    Proof. Initially, choose any uPC(L,M)L2(L,M), by Lemma 2.7. Now, define Υ:PC(L,M)2PC(L,M) as:

    Υ(u)={fPC(L,M):f(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)), hM(u)}, uPC(L,M).

    It is clear that we can determine a fixed point of the multivalued map Υ that satisfies Theorem 2.8. First, note that the set-valued map Υ(u) is convex due to the properties of M(u). Now, let us proceed with the proof of the theorem as follows:

    Step 1. Υ(Br)(Br),r>0, is bounded in PC(L,M), where Br={uPC(L,M):uPCr}. Here, it suffices to demonstrate the existence of a positive constant such that for each σΥ(u), uBr,σPC. If σΥ(u), then there is a hM(u) provided

    σ(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)),φL.

    By Hölder's inequality,

    σ(φ)C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φC(φ,φi)Ki(u(φi))N1u0+N2[u1g1(0,u(0))]+N1φ0C2(1+r)dz+N2φ0[b(z)+er+Bv(z)]dz+N10<φi<φLi(u(φi))+N20<φi<φKi(u(i))N1u0+N2φ2[u1g1(0,u(0))]+N1aC2(1+r)+N2[abL2(Q,R+)+era+aBvL2(Q,V)]+N1mi=1ci+N2mi=1li:=.

    Thus, Υ(Br) is bounded.

    Step 2. {Υ(u):uBr} is completely continuous.

    Let us note that for any uBr, σΥ(u), there exists hM(u) such that for all φL,

    σ(φ)C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φC(φ,φi)Ki(u(φi)).

    For 0<ξ1<ξ2a and k>0 very small,

    σ(ξ2)σ(ξ1)MC(ξ2,0)C(ξ1,0)u0+Q(ξ2,0)Q(ξ1,0)[u1g1(0,u(0))]+ξ1k0C(ξ2,z)C(ξ1,z)g1(z,u(z))dz+ξ1ξ1kC(ξ2,z)C(ξ1,z)g1(z,u(z))dz+ξ2ξ1C(ξ2,z) g1(z,u(z))dz+ξ1k0Q(ξ2,z)Q(ξ1,z)h(z)+Bv(z)dz+ξ1ξ1kQ(ξ2,z)Q(ξ1,z) h(z)+Bv(z)dz+ξ2ξ1Q(ξ2,z) h(z)+Bv(z)dz+0<φi<aC(ξ2,φi)C(ξ1,φi)Li(u(φi))+0<φi<aQ(ξ2,φi)Q(ξ1,φi)Ki(u(φi))C(ξ2,0)C(ξ1,0)u0+Q(ξ2,0)Q(ξ1,0)[u1g1(0,u(0))]+ξ1k0C(ξ2,z)C(ξ1,z)C2(1+r)dz+ξ1ξ1kC(ξ2,z)C(ξ1,z)C2(1+r)dz+N1 C2(1+r)(ξ2ξ1)+ξ1k0Q(ξ2,φi)Q(ξ1,φi)[b(z)+er+Bv(z)]dz+ξ1ξ1kQ(ξ2,z)Q(ξ1,z)[b(z)+er+Bv(z)]dz+N2ξ2ξ1[b(z)+er+Bv(z)]dz+0<φi<aC(ξ2,φi)C(ξ1,φi)Li(u(φi))+0<φi<aQ(ξ2,φi)Q(ξ1,φi)Ki(u(φi)). (3.1)

    From the uniform operator topology [33, Lemma 6.2], it is easily understood that (3.1) tends to zero of uBr as ξ2ξ1 and k0.

    Equivalently, for ξ1=0 and 0<ξ2a, we can show that σ(ξ2)u0M tends to zero independently of uBr as ξ20. Hence, we can conclude that {Υ(u):uBr} is equicontinuous of PC(L,M).

    Finally, from the assumptions (A1) and (A3) and by the definition of a relatively compact set, it is not difficult to check that {σ(t):σΥ(Br)} is relatively compact in M. Thus, by the generalized Arzelˊa-Ascoli theorem, we get that Υ is a multivalued compact map.

    Therefore, based on the above arguments, Υ is completely continuous.

    Step 3. Assume unu in PC(L,M), σnΥ(un) and σnσ in PC(L,M). Let us check σΥ(u). It is obvious that σnΥ(un) exist only when hnM(un) such that

    σn(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,un(z))dz+φ0Q(φ,z)hn(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)). (3.2)

    Here {hn}n1L2(L,M) is bounded from the hypothesis (A2). Hence we may assume that

    hnh weakly in L2(L,M). (3.3)

    From (3.2) and (3.3), we have

    σn(φ)C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)). (3.4)

    We can see that σnσ in PC(L,M) and hnM(u). According to Lemma 2.6 and (3.4), hM(u). Then, σΥ(u), and this shows that Υ has a closed graph. Hence using Proposition 3.12 of [36] implies that it is upper semicontinuous.

    Step 4. A priori estimate.

    Based on the results from Steps 1–3, we have established that the multivalued map Υ satisfies the following properties: upper semicontinuity, convex-valuedness, compactness, and relative compactness of Υ(Br). Therefore, Υ meets the conditions of Theorem 2.8, which implies that

    ={uPC(L,M):γuΥ(u), γ>1},

    is bounded. To prove Υ has a fixed point, let u, and hM(u) such that

    u(φ)=γ1C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+γ1φ0C(φ,z)g1(z,u(z))dz+γ1φ0Q(φ,z)h(z)dz+γ1φ0Q(φ,z)Bv(z)dz+γ10<φi<φC(φ,φi)Li(u(φi))+γ10<φi<φQ(φ,φi)Ki(u(φi)).

    From our assumptions,

    u(φ)MC(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi))N1u0+N2[u1g1(0,u(0))]+N1φ0C2(1+u(z))dz+N2φ0[a(z)+eu(z)+Bv(z)]dz+N10<φi<φLi(u(φi))+N20<φi<φKi(u(φi))ρ+K1u, (3.5)

    where

    ρ=N1[u0]+N2[u1g1(0,u(0))]+N1C2b+N2(bL2(L,R+)+BvL2(L,V))a+mi=1li]+N1mi=1ci,K1=a(N1C2+N2e).

    Hence, by the assumption K1<1 and (3.5), we can see that

    u=supφLu(φ)ρ+K1u, thus uρ1K1=:2.

    Hence, Υ has a fixed point.

    Consider that the mild solution for the Eq (2.5) is u(;v), the control variable v has values in L2(L,V), and the initial value is u0,u1M. At the terminal time a, the accessible set of the system (2.5) is defined as R(a,u0,u1)={u(a;u0,u1):vL2(L,V)}.

    Definition 4.1. The Eq (2.5) is approximately controllable on L, if for any initial value u0,u1M, then ¯R(a,u0,u1)=M.

    Consider the linear differential system:

    {u(φ)=A(φ)u(φ)+Bv(φ), φL=[0,a],u(0)=u0,u(0)=u1. (4.1)

    Now, define the operators for the system (4.1) as:

    Υa0=a0Q(a,z)BBQ(a,z)dzandR(β,Υa0)=(βI+Υa0)1, β>0,

    where B and Q(φ) are adjoint of B and Q(φ), respectively.

    Lemma 4.2. [9] The system (4.1) is approximately controllable on L iff β R(β,Υa0)0 as β0+ in the strong operator topology.

    Choose any β>0, uPC(L,M)L2(L,M) and uaM, as stated in Lemma 2.7, and it is possible to define a multivalued map Υβ:PC(L,M)2PC(L,M) given by

    Υβ(u)={fPC(L,M):f(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)),hM(u)},

    and

    vβ(φ)=BQ(a,z)R(β,Υa0)(uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,z)g1(z,u(z))dza0Q(a,z)h(z)dz0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi))).

    Theorem 4.3. Let (A1)(A3) be true. Υβ, for all β>0, has a fixed point on L=[0,a] if

    a(N1C2+N2e)(1+N22B2β)<1,

    where N1:=supφ,z[0,a]C(φ,z), N2:=supφ,z[0,a]Q(φ,z).

    Proof. For every uPC(L,M), by the nature of M(u), we can say Υβ is convex.

    Step 1. For every p>0,Υβ(Bp) is bounded in PC(L,M),

    Bp={uPC(L,M):uPCp}.

    Here, it is sufficient to prove that there exists a positive constant lβ and for all σΥβ(u), uBp, σPClβ. If σΥβ(u), there is hM(u) such that

    σ(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)), φL.

    Notice that

    vβ(φ)=BQ(a,z)R(β,Υa0)(uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,z)g1(z,u(z))dza0Q(a,z)h(z)dz0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi)))N2Bβ[ua+N1u0+N2u1g1(0,u(0))+aN1C2(1+p)+N2[bL2(L,R+)a+epa]+N1mi=1ci+N2mi=1li]:=Ψ. (4.2)

    From (4.2),

    σ(φ)MC(φ,0)u0M+Q(φ,0)[u1g1(0,u(0))]M+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φC(φ,φi)Ki(u(φi))N1u0+N2[u1g1(0,u(0))]+N1aC2(1+p)+N2[abL2(L,R+)+epa+BΨa]+N1mi=1ci+N2mi=1li:=lβ.

    Thus Υβ(Bp) is bounded in PC(L,M).

    Step 2. Consider any uBp, σΥβ(u). There exists hM(u), for every φL,

    σ(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bv(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)).

    Using vβ(t) as (4.2) and also from Theorem 3.1, Step 2, one can obtain that {Υβ(u):uBp} is completely continuous.

    Step 3. Consider unu in PC(L,M), σnΥβ(un) and σnσ in PC(L,M). We investigate σΥβ(u). Indeed, σnΥβ(un) exists only when hnM(un) such that

    σn(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,un(z))dz+φ0Q(φ,z)hn(z)dz+φ0Q(φ,z)BBQ(a,z)R(β,Υa0)(×)(uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,η)g1(η,un(η))dηa0Q(a,η)hn(η)dη0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi)))dz+0<φi<φC(φ,φi)Li(u(φi))+0<ti<tQ(φ,φi)Ki(u(φi)). (4.3)

    From (A1), we will prove {hn}n1L2(L,M) is bounded. Hence,

    hnh weakly in L2(L,M). (4.4)

    From (4.3) and (4.4),

    σn(φ)C(φ,0)u0+Q(φ,0)[z1g1(0,z(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)BBQ(a,z)R(β,Υa0)(×)(uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,η)g1(η,u(η))dηa0Q(a,η)h(η)dη0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi)))dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)). (4.5)

    Clearly, σnσ in PC(L,M) and hnM(un). According to Lemma 2.6 and (4.5), hM(u). Then, σΥ(u), and this shows that Υ has a closed graph. Hence, by using Proposition 3.12 of [36] implies that it is upper semicontinuous.

    Step 4. A priori estimate.

    By Steps 1–3, Υβ is convex valued, compact upper semicontinuous, Υβ(Bp) is a relatively compact set and meets Theorem 2.8, and

    J={uPC(L,M):γuΥβ(u), γ>1},

    is bounded.

    Consider uJ. Then there exists hM(u) such that

    u(φ)=γ1C(φ,0)u0+γ1Q(φ,0)[u1g1(0,u(0))]+γ1φ0C(φ,z)g1(φ,u(φ))dz+γ1φ0Q(φ,z)h(z)dz+γ1φ0Q(φ,z)Bvβ(z)dz+γ10<φi<φC(φ,φi)Li(u(φi))+γ10<φi<φQ(φ,φi)Ki(u(φi)),

    and

    vβ(φ)=BQ(a,z)R(β,Υa0)(uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,z)g1(z,u(z))dza0Q(a,z)h(z)dz0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi))).

    Then from our assumptions,

    u(φ)MC(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)h(z)dz+φ0Q(φ,z)Bvβ(z)dz+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi))N1z0+N2[u1g1(0,u(0))]+N1φ0C2(1+u(φ))dz+N2φ0[b(z)+eu(z)+B(N2Bβ[ua+N1u0+N2u1g1(0,z(0))+aN1C2(1+p)+N2[bL2(L,R+)a+epa]+N1mi=1ci+N2mi=1li])dz+N10<φi<φLi(u(φi))+N20<φi<φKi(u(φi))ρ+K2u, (4.6)

    where

    ρ=N1u0+N2[u1g1(0,u(0))]+N1C2a+N2[bL2(L,R+)]a+N22B2β(ua+N1u0+N2[u1g1(0,u(0))]+N1C2a+N2[bL2(L,R+)]a)+N1mi=1ci+N2mi=1li.K2=a(N1C2+N2e)(1+N22B2β).

    According to K2<1 and (4.6), we conclude,

    u=supφLu(φ)ρ+K2u, and thus uρ1K2=:3.

    Therefore J is bounded which leads to the conclusion that Υβ has a fixed point.

    Theorem 4.4. Suppose the conditions of the above theorem are satisfied. Then, if system (4.1) is approximately controllable on the set L, it follows that system (2.5) is also approximately controllable on L.

    Proof. By Theorem 4.3, Υβ, for all β>0, has a fixed point in PC(L,M). Let uβ be a fixed point of Υβ in PC(L,M). Clearly, Υβ is a mild solution of (2.5). Then, there exists hβM(uβ) such that for each φL,

    uβ(φ)=C(φ,0)u0+Q(φ,0)[u1g1(0,u(0))]+φ0C(φ,z)g1(z,u(z))dz+φ0Q(φ,z)hβ(z)dz+φ0Q(φ,z)BBQ(a,z)R(β,Υa0)(×)(uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,η)g1(η,u(η))dηa0Q(a,η)hβ(η)dη0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi)))du+0<φi<φC(φ,φi)Li(u(φi))+0<φi<φQ(φ,φi)Ki(u(φi)).

    Since IΥa0R(β,Υa0)=βR(β,Υa0), we have uβ(a)=uaβR(β,Υa0)E(hβ). From the above,

    E(hβ)=uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,η)g1(η,u(η))dηa0Q(a,η)hβ(η)dη0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi)).

    From the hypothesis (A1) and from Theorem 4.3, H(φ,u)b(φ)+eu(φ)b(φ)+ep:=ν(φ). Then,

    a0hβ(z)dzνL2(L,R+)a.

    Consequently {hβ} is a bounded sequence in L2(L,M). So, there exists a subsequence, {hβ}, which will converge weakly to h in L2(L,M). It is expressed as

    g=uaC(a,0)u0Q(a,0)[u1g1(0,u(0))]a0C(a,η)g1(η,u(η))dηa0Q(a,η)h(η)dη0<φi<aC(a,φi)Li(u(φi))0<φi<aQ(a,φi)Ki(u(φi)).

    Now,

    E(hβ)g=a0C(a,η)[g1(η,yβ(η))g1(η,y(η))]dη+a0S(a,η)[hβ(η)h(η)]dηM1sup0ηa[g1(η,yβ(η))g1(η,y(η))]+M2sup0ηa[hβ(η)h(η)]. (4.7)

    From Step 2 in Theorem 4.3 and by the Arzelˊa-Ascoli theorem, we get that the compactness of the right-hand side of (4.7) tends to zero as β0+, which gives

    uβ(a)u1=βR(β,Υa0)E(hβ)βR(β,Υa0)(g)+E(hβ)g0, as β0+.

    Hence, (2.5) is approximately controllable on L.

    We utilize our theoretical findings on a concrete partial differential equation. We need to provide the required technological resources to accomplish our goals.

    Now, let us take

    A(φ)=A+˜A(φ),

    where A is the infinitesimal generator of a cosine function C(φ) with associated sine function Q(t), and ˜A(φ):D(˜A(φ))M is a closed linear operator with DD(˜A(φ)), for all φL. We take the space M=L2(T,C), where the group T is defined as the quotient R/2πZ, and we denote by L2(T,C) the space of 2π periodic 2-integrable functions from R to C. Also, we use the identification between functions on T and 2π periodic functions on R. Furthermore, H2(T,C) denotes the Sobolev space of 2π periodic from R to C such that uL2(T,C).

    We define Au(φ)=u(φ) with domain D(A)=H2(T,C). Then, A can be written as

    Au=n=1n2u,xnxn,uD(A),

    where xn(φ)=12πeinφ(nZ) is an orthonormal basis of M. It is well known that A is the infinitesimal generator of a strongly continuous cosine function C(φ) on M. The cosine function C(φ) is given by

    C(φ)u=n=1cosntu,xnxn,uM,φR.

    The connected sine operator (Q(φ))φR is

    Q(t)u=n=1sinntnu,xnxn,uM,φR.

    It is clear that C(φ)1 for all φR, so it is uniformly bounded on R.

    Assume the following second-order non-autonomous neutral differential system of the form:

    φ[φu(φ,)ˆg1(φ,y(φ,)]=2q2u(φ,)+B(φ)φu(φ,)+B˜v(φ,)+ϕ(φ,u(φ,)),0<φ<a,u(φ,0)=u(φ,π)=0, 0<φ<a,u(0,)=u0(),(0,π),φy(0,)=u1(),Δu(φk)()=φk0bk(φkφ)u(φ,)dφ,Δφu(φk)()=φk0bk(φkφ)u1(φ,)dφ, (5.1)

    where B:RR is a continuous function such that supφ[0,a]B(φ)=c0, and u(φ,) represents the temperature at (0,π) and φ(0,a). Let ϕ(φ,u(φ,))=ϕ1(ξ1,φ(φ,))+ϕ2(φ,u(φ,)) and ϕ2(φ,u(φ,)) is the temperature function of the form ϕ2(φ,u(φ,))H(φ,,u(φ,)),(φ,)(0,a)×(0,π). Here, the nonsmooth and nonconvex function H=H(φ,,k) is defined as a locally Lipschitz energy function. H is the generalized Clarke's gradient in the third variable k [6]. Assume that H fulfills the assumptions (A1), H(k)=min{h1(ν),h2(ν)}, and hi=RR(i=1,2) are convex quadratic functions [16].

    Now we take ˜A(φ)u()=B(φ)u() defined on H1(T,C). It is easy to see that A(φ)=A+˜A(φ) is a closed linear operator. Initially, we will show that A+˜A(φ) generates an evolution operator. It is well known that the solution of the scalar initial value problem

    p(φ)=n2p(φ)+q(φ),p(s)= 0, p(s)= p1,

    is given by

    p(t)=p1nsinn(φz)+1nφzsinn(φı)q(ı)dı.

    Therefore, the solution of the scalar initial value problem

    p(φ)=n2p(φ)+inB(φ)p(φ), (5.2)
    p(z)= 0, p(z)=p1, (5.3)

    satisfies the following equation:

    p(φ)=p1nsinn(φz)+iφzsinn(φı)B(ı)q(ı)dı.

    By the Gronwall-Bellman lemma, we obtain

    |p(t)|p1nec(φz) (5.4)

    for zφ and c is a constant. We denote by pn(φ,z) the solution of (5.2)-(5.3). We define

    Q(φ,z)u=n=1pn(φ,z)u,xnxn,uM,φR.

    It follows from the estimate (5.4) that Q(φ,z):MM is well defined and satisfies the condition of Definition 2.1. We set u(t)=u(φ,), that is, u(φ)()=u(φ,), φL, [0,π]. Then, we assume the infinite dimensional Hilbert space V, and we have

    V={v:vȷ=1vȷxȷ with ȷ=2v2ȷ<},

    with V as

    vV=(ȷ=2v2ȷ)12.

    Let us define BL(V,M) as below:

    Bv=2v2x1+ȷ=2vȷxȷ<,for all v=ȷ=2vȷxȷV.

    It continuous that

    Bv=(2v+v2)x2+ȷ=3vȷxȷ, for all v=ȷ=2vȷxȷM.

    Assume these functions satisfy the requirements of the hypotheses. From the above choices of the functions and evolution operator A(φ) with B, system (5.1) can be formulated as system (2.5) in M. Since all hypotheses of Theorem 4.4 are satisfied, the approximate controllability of system (5.1) on L follows from Theorem 4.4.

    The principles of approximate controllability of second-order differential impulsive systems with the impact of hemivariational inequalities are the main focus of this article. The generalized Clarke's subdifferential technique and multivalued maps were used to suggest and demonstrate the necessary requirements for existence and approximate controllability. In the future, we will extend the results with finite delay and stochastic systems.

    Yong-Ki Ma: Conceptualization, Methodology, Validation, Visualization, Writing–original draft. N. Valliammal: Conceptualization, Formal analysis, Methodology, Validation, Visualization, Writing–original draft. K. Jothimani: Conceptualization, Formal analysis, Investigation, Resources, Supervision, Writing–original draft. V. Vijayakumar: Conceptualization, Formal analysis, Resources, Supervision, Writing–original draft, Writing–Review & Editing. All authors have read and approved the final version of the manuscript for publication.

    This work was supported by the research grant of Kongju National University in 2024. The authors are immensely grateful to the anonymous referees for their careful reading of this paper and helpful comments, which have been very useful for improving the quality of this paper.

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.



    [1] A. Montieri, D. Ciuonzo, G. Bovenzi, V. Persico, A. Pescapé, A dive into the dark web: hierarchical traffic classification of anonymity tools, IEEE Trans. Network Sci. Eng., 7 (2019), 1043–1054. https://doi.org/10.1109/TNSE.2019.2901994 doi: 10.1109/TNSE.2019.2901994
    [2] G. Aceto, A. Pescapé, Internet censorship detection: a survey, Comput. Networks, 83 (2015), 381–421. https://doi.org/10.1016/j.comnet.2015.03.008 doi: 10.1016/j.comnet.2015.03.008
    [3] Y. D. Goli, R. Ambika, Network traffic classification techniques-a review, in 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), (2018), 219–222. https://doi.org/10.1109/CTEMS.2018.8769309
    [4] T. Bujlow, V. Carela-Español, P. Barlet-Ros Independent comparison of popular DPI tools for traffic classification, Comput. Networks, 76 (2015), 75–89. https://doi.org/10.1016/j.comnet.2014.11.001 doi: 10.1016/j.comnet.2014.11.001
    [5] S. Rezaei, X. Liu, Deep learning for encrypted traffic classification: an overview, IEEE Commun. Mag., 57 (2019), 76–81. https://doi.org/10.1109/MCOM.2019.1800819 doi: 10.1109/MCOM.2019.1800819
    [6] Y. Hu, F. Zou, L. Li, P. Yi, Traffic classification of user behaviors in Tor, I2P, ZeroNet, Freenet, in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), (2020), 418–424. https://doi.org/10.1109/TrustCom50675.2020.00064
    [7] Z. Fan, R. Liu, Investigation of machine learning based network traffic classification, in 2017 International Symposium on Wireless Communication Systems (ISWCS), (2017), 1–6. https://doi.org/10.1109/ISWCS.2017.8108090
    [8] N. Bayat, W. Jackson, D. Liu, Deep learning for network traffic classification, preprint, arXiv: 2106.12693.
    [9] X. Hu, C. Gu, F. Wei, CLD-Net: a network combining CNN and LSTM for internet encrypted traffic classification, Secur. Commun. Netw., 2021 (2021), 1–15. https://doi.org/10.1155/2021/5518460 doi: 10.1155/2021/5518460
    [10] A. H. Lashkari, G. Kaur, A. Rahali, Didarknet: a contemporary approach to detect and characterize the darknet traffic using deep image learning, in 2020 the 10th International Conference on Communication and Network Security, (2020), 1–13. https://doi.org/10.1145/3442520.3442521
    [11] K. Lin, X. Xu, H. Gao, TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT, Comput. Networks, 190 (2021), 107974. https://doi.org/10.1016/j.comnet.2021.107974 doi: 10.1016/j.comnet.2021.107974
    [12] K. Kim, J. H. Lee, H. K. Lim, S. W. Oh, Y. H. Han, Deep RNN-based network traffic classification scheme in edge computing system, Comput. Sci. Inf. Syst., 19 (2022), 165–184. https://doi.org/10.2298/CSIS200424038K doi: 10.2298/CSIS200424038K
    [13] J. Lan, X. Liu, B. Li, Y. Li, T. Geng, DarknetSec: a novel self-attentive deep learning method for darknet traffic classification and application identification, Comput. Secur., 116 (2022), 102663. https://doi.org/10.1016/j.cose.2022.102663 doi: 10.1016/j.cose.2022.102663
    [14] Z. Wu, Y. Dong, X. Qiu, J. Jin, Online multimedia traffic classification from the QoS perspective using deep learning, Comput. Networks, 204 (2022), 108716. https://doi.org/10.1016/j.comnet.2021.108716 doi: 10.1016/j.comnet.2021.108716
    [15] K. Shahbar, A. N. Zincir-Heywood, Effects of shared bandwidth on anonymity of the I2P network users, in 2017 IEEE Security and Privacy Workshops (SPW), (2017), 235–240. https://doi.org/10.1109/SPW.2017.19
    [16] Z. Rao, W. Niu, X. S. Zhang, H. Li, Tor anonymous traffic identification based on gravitational clustering, Peer-to-Peer Networking Appl., 11 (2018), 592–601. https://doi.org/10.1007/s12083-017-0566-4 doi: 10.1007/s12083-017-0566-4
    [17] L. A. Iliadis, T. Kaifas, Darknet traffic classification using machine learning techniques, in 2021 10th International Conference on Modern Circuits and Systems Technologies (MOCAST), (2021), 1–4. https://doi.org/10.1109/MOCAST52088.2021.9493386
    [18] M. B. Sarwar, M. K. Hanif, R. Talib, M. Younas, M. U. Sarwar, DarkDetect: darknet traffic detection and categorization using modified convolution-long short-term memory, IEEE Access, 9 (2021), 113705–113713. https://doi.org/10.1109/ACCESS.2021.3105000 doi: 10.1109/ACCESS.2021.3105000
    [19] T. Shapira, Y. Shavitt, FlowPic: a generic representation for encrypted traffic classification and applications identification, IEEE Trans. Netw. Serv. Manage., 18 (2021), 1218–1232. https://doi.org/10.1109/TNSM.2021.3071441 doi: 10.1109/TNSM.2021.3071441
    [20] H. Yao, C. Liu, P. Zhang, S. Wu, C. Jiang, S. Yu, Identification of encrypted traffic through attention mechanism based long short-term memory, IEEE Trans. Big Data, 8 (2022), 241–252. https://doi.org/10.1109/TBDATA.2019.2940675 doi: 10.1109/TBDATA.2019.2940675
    [21] J. Xie, S. Li, X. Yun, Y. Zhang, P. Chang, Hstf-model: an http-based trojan detection model via the hierarchical spatio-temporal features of traffics, Comput. Secur., 96 (2020), 101923. https://doi.org/10.1016/j.cose.2020.101923 doi: 10.1016/j.cose.2020.101923
    [22] M. M. Hassan, A. Gumaei, A. Alsanad, M. Alrubaian, G. Fortino, A hybrid deep learning model for efficient intrusion detection in big data environment, Inf. Sci., 513 (2020), 386–396. https://doi.org/10.1016/j.ins.2019.10.069 doi: 10.1016/j.ins.2019.10.069
    [23] P. R. Kanna, P. Santhi, Unified deep learning approach for efficient intrusion detection system using integrated spatial–temporal features, Knowledge-Based Syst., 226 (2021), 107132. https://doi.org/10.1016/j.knosys.2021.107132 doi: 10.1016/j.knosys.2021.107132
    [24] L. Liu, J. Zhen, G. Li, G. Zhan, Z. He, B. Du, et al., Dynamic spatial-temporal representation learning for traffic flow prediction, IEEE Trans. Intell. Transp. Syst., 22 (2021), 7169–7183. https://doi.org/10.1109/TITS.2020.3002718 doi: 10.1109/TITS.2020.3002718
    [25] G. D'Angelo, F. Palmieri, Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial–temporal features extraction, J. Network Comput. Appl., 173 (2021), 102890. https://doi.org/10.1016/j.jnca.2020.102890 doi: 10.1016/j.jnca.2020.102890
    [26] M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, J. Lloret, Network traffic classifier with convolutional and recurrent neural networks for internet of things, IEEE Access, 5 (2017), 18042–18050. https://doi.org/10.1109/ACCESS.2017.2747560 doi: 10.1109/ACCESS.2017.2747560
    [27] F. Xiao, GEJS: a generalized evidential divergence measure for multisource information fusion, IEEE Trans. Syst. Man Cybern.: Syst., 53 (2023), 2246–2258. https://doi.org/10.1109/TSMC.2022.3211498 doi: 10.1109/TSMC.2022.3211498
    [28] L. Vu, C. T. Bui, Q. U. Nguyen, A deep learning based method for handling imbalanced problem in network traffic classification, in Proceedings of the 8th International Symposium on Information and Communication Technology, (2017), 333–339. https://doi.org/10.1145/3155133.3155175
    [29] W. Wang, M. Zhu, J. Wang, X. Zeng, Z. Yang, End-to-end encrypted traffic classification with one-dimensional convolution neural networks, in 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), (2017), 43–48. https://doi.org/10.1109/ISI.2017.8004872
    [30] C. Liu, L. He, G. Xiong, Z. Cao, Z. Li, FS-Net: a flow sequence network for encrypted traffic classification, in IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, (2019), 1171–1179. https://doi.org/10.1109/INFOCOM.2019.8737507
    [31] G. Aceto, D. Ciuonzo, A. Montieri, A. Pescapé, DISTILLER: encrypted traffic classification via multimodal multitask deep learning, J. Network Comput. Appl., 183–184 (2021), 102985. https://doi.org/10.1016/j.jnca.2021.102985 doi: 10.1016/j.jnca.2021.102985
    [32] G. Xie, Q. Li, Y. Jiang, Self-attentive deep learning method for online traffic classification and its interpretability, Comput. Networks, 196 (2021), 108267. https://doi.org/10.1016/j.comnet.2021.108267 doi: 10.1016/j.comnet.2021.108267
    [33] G. Bovenzi, L. Yang, A. Finamore, G. Aceto, D. Ciuonzo, A. Pescapè, et al., A first look at class incremental learning in deep learning mobile traffic classification, preprint, arXiv: 2107.04464.
    [34] F. Hu, S. Zhang, X. Lin, L. Wu, N. Liao, Y. Song, Network traffic classification model based on attention mechanism and spatiotemporal features, EURASIP J. Inf. Secur., 2023 (2023), 1–25. https://doi.org/10.1186/s13635-023-00141-4 doi: 10.1186/s13635-023-00141-4
    [35] Z. Wang, B. Ma, Y. Zeng, X. Lin, K. Shi, Z. Wang, Differential preserving in XGBoost model for encrypted traffic classification, in 2022 International Conference on Networking and Network Applications (NaNA), (2022), 220–225. https://doi.org/10.1109/NaNA56854.2022.00044
    [36] Q. Lyu, X. Lu, Effective media traffic classification using deep learning, in Proceedings of the 2019 3rd International Conference on Compute and Data Analysis, (2019), 139–146. https://doi.org/10.1145/3314545.3316278
    [37] C. Y. Lin, B. H. Chen, W. Y. Lan, An efficient approach for encrypted traffic classification using CNN and bidirectional GRU, in 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), (2022), 368–373. https://doi.org/10.1109/ICCECE54139.2022.9712708
    [38] A. Velichko, Neural network for low-memory IoT devices and MNIST image recognition using kernels based on logistic map, Electronics, 9 (2020), 1432. https://doi.org/10.3390/electronics9091432 doi: 10.3390/electronics9091432
    [39] V. Tong, H. A. Tran, S. Souihi, A. Mellouk, A novel QUIC traffic classifier based on convolutional neural networks, in 2018 IEEE Global Communications Conference (GLOBECOM), (2018), 1–6. https://doi.org/10.1109/GLOCOM.2018.8647128
    [40] Y. Guo, Z. Li, Z. Li, G. Xiong, M. Jiang, G. Gou, FLAGB: focal loss based adaptive gradient boosting for imbalanced traffic classification, in 2020 International Joint Conference on Neural Networks (IJCNN), (2020), 1–8. https://doi.org/10.1109/IJCNN48605.2020.9207336
    [41] Z. Bu, B. Zhou, P. Cheng, K. Zhang, Z. Ling, Encrypted network traffic classification using deep and parallel network-in-network models, IEEE Access, 8 (2020), 132950–132959. https://doi.org/10.1109/ACCESS.2020.3010637 doi: 10.1109/ACCESS.2020.3010637
    [42] L. A. Iliadis, T. Kaifas, Darknet traffic classification using machine learning techniques, in 2021 10th International Conference on Modern Circuits and Systems Technologies (MOCAST), (2021), 1–4. https://doi.org/10.1109/MOCAST52088.2021.9493386
    [43] G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, A. A. Ghorbani, Characterization of encrypted and vpn traffic using time-related, in Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), (2016), 407–414. https://doi.org/10.5220/0005740704070414
    [44] A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, A. A. Ghorbani, Characterization of tor traffic using time based features, in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP 2017), (2017), 253–262. https://doi.org/10.5220/0006105602530262
    [45] Q. A. Al-Haija, M. Krichen, W. A. Elhaija, Machine-learning-based darknet traffic detection system for IoT applications, Electronics, 11 (2022), 556. https://doi.org/10.3390/electronics11040556 doi: 10.3390/electronics11040556
    [46] N. Rust-Nguyen, M. Stamp, Darknet traffic classification and adversarial attacks, preprint, arXiv: 2206.06371.
    [47] R. Wang, Y. Zhao, A survey on anonymous communication systems traffic identification and classification, in 2021 3rd International Conference on Advanced Information Science and System (AISS 2021), 36 (2021), 1–5. https://doi.org/10.1145/3503047.3503087
    [48] N. Rust-Nguyen, M. Stamp, Darknet traffic classification and adversarial attacks, preprint, arXiv: 2206.06371.
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1540) PDF downloads(60) Cited by(1)

Figures and Tables

Figures(10)  /  Tables(9)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog