JOURNAL ARTICLE

Tabular-based self-supervised learning approach for encrypted traffic classification

Abstract

Encrypted traffic classification (ETC) plays an important role in network management. In most research, the statistical features, transformed traffic images, or text are used for classification. However, the statistical features' design is time-consuming and labor-intensive, and the transformed traffic data lack spatial or semantic features. Considering that the headers of traffic packets have a uniform structure and are independent of each other, traffic data are most similar to tabular data. Thus we propose a data processing approach to convert packet headers into traffic tables in which each field is viewed as a column (feature). In addition, traffic data are hard to label in real traffic environments, and each field contributes differently to the classification. Therefore, a self-supervised learning algorithm, SubTab, is used as the baseline network to reduce the reliance on labeled data and assign different weights to different fields. To the best of our knowledge, this is the first time that the ETC problem is solved from the tabular domain. Experimental results on two real-world datasets, ISCX VPN-nonVPN and the self-collected dataset SHU-ET, demonstrate that our method surpasses state-of-the-art methods based on traffic images or text and proves that traffic tables are more suitable for ETC problems. In addition, our method achieves a great performance with only 10% of labeled data and reduces the reliance on labeling data.

Keywords:
Traffic classification Computer science Encryption Data mining Network packet Field (mathematics) Artificial intelligence Deep packet inspection Traffic generation model Data field Traffic analysis Machine learning Data modeling Database Computer network

Metrics

4
Cited By
1.02
FWCI (Field Weighted Citation Impact)
32
Refs
0.76
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.