Javascript must be enabled to continue!
Tokenized Flow-Statistics Encrypted Traffic Analysis: Comparative Evaluation of 1D-CNN, BiLSTM, and Transformer on ISCX VPN-nonVPN 2016 (A1+A2, 60 s)
View through CrossRef
End-to-end encryption is now the default for major Internet applications, reducing the effectiveness of payload-based deep packet inspection for security monitoring and traffic engineering. This paper evaluates payload-agnostic encrypted traffic analysis using only time-based bidirectional flow statistics derived from packet headers. We study the ISCX VPN-nonVPN 2016 dataset (60 s flow timeout) and conduct two supervised tasks: (i) Scenario A1 binary VPN detection and (ii) Scenario A2 14-class VPN-service identification across seven applications captured under VPN and non-VPN conditions. Because the released dataset provides engineered flow feature vectors rather than packet sequences, we introduce a structured tokenization that maps the 23 time-based features into a 6×4 token matrix capturing rate, inter-arrival, and burst/idle dynamics. On this representation we compare a 1D convolutional neural network (1D-CNN), a bidirectional LSTM (BiLSTM), and a Transformer encoder, and we report Accuracy, Macro-F1, ROC-AUC, and PR-AUC under a fixed 70/15/15 split (seed=42) with class-weighted cross-entropy and early stopping. On A1, the best model is an MLP baseline (Macro-F1=0.716), while the 1D-CNN achieves Macro-F1=0.689 with ROC-AUC=0.751. On the more challenging A2 task, the MLP reaches Macro-F1=0.389 and the 1D-CNN reaches Macro-F1=0.346. Feature-group masking ablations show that ACTIVE and FLOWIAT-related timing statistics contribute most to A2 performance, and a token-length study shows monotonic gains up to the full 6-token representation. Finally, cross-domain robustness tests (train on non-VPN flows, test on VPN flows, and vice versa) reveal large performance degradation (Macro-F1≈0.12–0.34), highlighting the need to evaluate encrypted traffic models under realistic tunneling shifts.
Scientific Publication Center
Title: Tokenized Flow-Statistics Encrypted Traffic Analysis: Comparative Evaluation of 1D-CNN, BiLSTM, and Transformer on ISCX VPN-nonVPN 2016 (A1+A2, 60 s)
Description:
End-to-end encryption is now the default for major Internet applications, reducing the effectiveness of payload-based deep packet inspection for security monitoring and traffic engineering.
This paper evaluates payload-agnostic encrypted traffic analysis using only time-based bidirectional flow statistics derived from packet headers.
We study the ISCX VPN-nonVPN 2016 dataset (60 s flow timeout) and conduct two supervised tasks: (i) Scenario A1 binary VPN detection and (ii) Scenario A2 14-class VPN-service identification across seven applications captured under VPN and non-VPN conditions.
Because the released dataset provides engineered flow feature vectors rather than packet sequences, we introduce a structured tokenization that maps the 23 time-based features into a 6×4 token matrix capturing rate, inter-arrival, and burst/idle dynamics.
On this representation we compare a 1D convolutional neural network (1D-CNN), a bidirectional LSTM (BiLSTM), and a Transformer encoder, and we report Accuracy, Macro-F1, ROC-AUC, and PR-AUC under a fixed 70/15/15 split (seed=42) with class-weighted cross-entropy and early stopping.
On A1, the best model is an MLP baseline (Macro-F1=0.
716), while the 1D-CNN achieves Macro-F1=0.
689 with ROC-AUC=0.
751.
On the more challenging A2 task, the MLP reaches Macro-F1=0.
389 and the 1D-CNN reaches Macro-F1=0.
346.
Feature-group masking ablations show that ACTIVE and FLOWIAT-related timing statistics contribute most to A2 performance, and a token-length study shows monotonic gains up to the full 6-token representation.
Finally, cross-domain robustness tests (train on non-VPN flows, test on VPN flows, and vice versa) reveal large performance degradation (Macro-F1≈0.
12–0.
34), highlighting the need to evaluate encrypted traffic models under realistic tunneling shifts.
Related Results
Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Two-Stage Short-Term Wind Power Prediction based on Improved CNN-BiLSTM-Attention
Two-Stage Short-Term Wind Power Prediction based on Improved CNN-BiLSTM-Attention
To enhance the accuracy of short-term wind power prediction, this paper proposes a novel two-stage forecasting framework that integrates Sequential Variational Mode Decomposition (...
Automatic Load Sharing of Transformer
Automatic Load Sharing of Transformer
Transformer plays a major role in the power system. It works 24 hours a day and provides power to the load. The transformer is excessive full, its windings are overheated which lea...
Short-Term Traffic Flow Forecasting Method Based on Secondary Decomposition and Conventional Neural Network–Transformer
Short-Term Traffic Flow Forecasting Method Based on Secondary Decomposition and Conventional Neural Network–Transformer
Because of the random volatility of traffic data, short-term traffic flow forecasting has always been a problem that needs to be further researched. We developed a short-term traff...
Research on AQI prediction of Chengdu-Chongqing economic circle based on CNN-BiLSTM-Selfattention model
Research on AQI prediction of Chengdu-Chongqing economic circle based on CNN-BiLSTM-Selfattention model
Air pollution has emerged as a significant environmental challenge worldwide. The Chengdu- Chongqing economic circle is central to regional development in China. Research into pred...
A Traffic Flow Prediction Method Based on Blockchain and Federated Learning
A Traffic Flow Prediction Method Based on Blockchain and Federated Learning
Abstract
Traffic flow prediction is the an important issue in the field of intelligent transportation, and real-time and accurate traffic flow prediction plays a crucial ro...
Trustworthy Deep Learning for Encrypted Traffic Classification
Trustworthy Deep Learning for Encrypted Traffic Classification
Abstract
Network traffic classification refers to the identification of collected network traffic data of various applications, which is widely used in research fields such...
Predictors of Statistics Anxiety Among Graduate Students in Saudi Arabia
Predictors of Statistics Anxiety Among Graduate Students in Saudi Arabia
Problem The problem addressed in this study is the anxiety experienced by graduate students toward statistics courses, which often causes students to delay taking statistics cours...

