{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:38:32Z","timestamp":1774517912385,"version":"3.50.1"},"reference-count":144,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T00:00:00Z","timestamp":1708041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR Project","award":["No ANR-21-CE94-0001 (MINT)"],"award-info":[{"award-number":["No ANR-21-CE94-0001 (MINT)"]}]},{"name":"the France and Chicago Collaborating in the Sciences program"},{"name":"NSF","award":["CNS-2124393"],"award-info":[{"award-number":["CNS-2124393"]}]},{"name":"the F\u00e9d\u00e9ration Informatique de Lyon through the INTERFERE project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2024,2,16]]},"abstract":"<jats:p>Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network traces can often augment existing datasets. Unfortunately, current synthetic trace generation methods, which typically produce only aggregated flow statistics or a few selected packet attributes, do not always suffice, especially when model training relies on having features that are only available from packet traces. This shortfall manifests in both insufficient statistical resemblance to real traces and suboptimal performance on ML tasks when employed for data augmentation. In this paper, we apply diffusion models to generate high-resolution synthetic network traffic traces. We present NetDiffusion1, a tool that uses a finely-tuned, controlled variant of a Stable Diffusion model to generate synthetic network traffic that is high fidelity and conforms to protocol specifications. Our evaluation demonstrates that packet captures generated from NetDiffusion can achieve higher statistical similarity to real data and improved ML model performance than current state-of-the-art approaches (e.g., GAN-based approaches). Furthermore, our synthetic traces are compatible with common network analysis tools and support a myriad of network tasks, suggesting that NetDiffusion can serve a broader spectrum of network analysis and testing tasks, extending beyond ML-centric applications.<\/jats:p>","DOI":"10.1145\/3639037","type":"journal-article","created":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T17:01:32Z","timestamp":1708534892000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1652-8419","authenticated-orcid":false,"given":"Xi","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6170-2167","authenticated-orcid":false,"given":"Shinan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3771-7876","authenticated-orcid":false,"given":"Aaron","family":"Gember-Jacobson","sequence":"additional","affiliation":[{"name":"Colgate University, Hamilton, USA"}]},{"given":"Arjun Nitin","family":"Bhagoji","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2156-5305","authenticated-orcid":false,"given":"Paul","family":"Schmitt","sequence":"additional","affiliation":[{"name":"University of Hawaii, Manoa \/ Invisv, Honolulu, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4447-960X","authenticated-orcid":false,"given":"Francesco","family":"Bronzino","sequence":"additional","affiliation":[{"name":"Univ Lyon, EnsL, UCBL, CNRS, LIP, Lyon, France"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Sebastian Abt and Harald Baier. 2014. Are we missing labels? A study of the availability of ground-truth in network security research. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (badgers). IEEE 40--55.","DOI":"10.1109\/BADGERS.2014.11"},{"key":"e_1_2_1_2_1","first-page":"1","article-title":"ook, Iman Akbari, Mohammad A Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stephane Tuffin. 2021. A look behind the curtain: traffic classification in an increasingly encrypted web","volume":"5","year":"2021","unstructured":"021)]% akbari2021look, Iman Akbari, Mohammad A Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stephane Tuffin. 2021. A look behind the curtain: traffic classification in an increasingly encrypted web. Proceedings of the ACM on Measurement and Analysis of Computing Systems, Vol. 5, 1 (2021), 1--26.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"e_1_2_1_3_1","volume-title":"Martin Arjovsky and L\u00e9on Bottou","year":"2017","unstructured":", Martin Arjovsky and L\u00e9on Bottou. 2017. Towards principled methods for training generative adversarial networks. arXiv preprint arXiv:1701.04862 (2017)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511359"},{"key":"e_1_2_1_5_1","volume-title":"17th Sound and Music Computing Conference, Online.","author":"Barahona-Rios Adri\u00e1n","year":"2020","unstructured":"and Pauletto(2020)]% barahona2020synthesising, Adri\u00e1n Barahona-Rios and Sandra Pauletto. 2020. Synthesising knocking sound effects using conditional WaveGAN. In 17th Sound and Music Computing Conference, Online."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"e_1_2_1_7_1","volume-title":"A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD explorations newsletter","author":"Batista Gustavo EAPA","year":"2004","unstructured":"Gustavo EAPA Batista, Ronaldo C Prati, and Maria Carolina Monard. 2004. A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD explorations newsletter , Vol. 6, 1 (2004), 20--29."},{"key":"e_1_2_1_8_1","unstructured":"Jay Beale Angela Orebaugh and Gilbert Ramirez. 2006. Wireshark & Ethereal network protocol analyzer toolkit. Elsevier."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577807"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1987.1096769"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.019"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491052"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366704"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010637"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564084"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2014.2308905"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105382"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258054"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/1754-9485.13261"},{"key":"e_1_2_1_22_1","volume-title":"2000 USENIX Annual Technical Conference (USENIX ATC 00)","author":"Cho Kenjiro","year":"2000","unstructured":"Kenjiro Cho, Koushirou Mitsuya, and Akira Kato. 2000. Traffic data repository at the $$WIDE$$ project. In 2000 USENIX Annual Technical Conference (USENIX ATC 00)."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90321-3_21"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2938863"},{"key":"e_1_2_1_25_1","unstructured":"Kimberly C Claffy. 1995. Internet traffic characterization. (1995)."},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Benoit Claise. 2004. Cisco systems netflow services export version 9. Technical Report.","DOI":"10.17487\/rfc3954"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","unstructured":"Beno\u00eet Claise and Brian Trammell. 2013. Information Model for IP Flow Information Export (IPFIX). RFC 7012. https:\/\/doi.org\/10.17487\/RFC7012","DOI":"10.17487\/RFC7012"},{"key":"e_1_2_1_28_1","volume-title":"Generative adversarial networks: An overview","author":"Creswell Antonia","year":"2018","unstructured":"Antonia Creswell, Tom White, Vincent Dumoulin, Kai Arulkumaran, Biswa Sengupta, and Anil A Bharath. 2018. Generative adversarial networks: An overview. IEEE signal processing magazine , Vol. 35, 1 (2018), 53--65."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3261988"},{"key":"e_1_2_1_30_1","volume-title":"Yaxing Yao, and Josiah Hester.","author":"Cruz Stefany","year":"2023","unstructured":"Stefany Cruz, Logan Danek, Shinan Liu, Christopher Kraemer, Zixin Wang, Nick Feamster, Danny Yuxing Huang, Yaxing Yao, and Josiah Hester. 2023. Augmented Reality's Potential for Identifying and Mitigating Home Privacy Leaks. arXiv preprint arXiv:2301.11998 (2023)."},{"key":"e_1_2_1_31_1","volume-title":"A session-packets-based encrypted traffic classification using capsule neural networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications","author":"Cui Susu","unstructured":"Susu Cui, Bo Jiang, Zhenzhen Cai, Zhigang Lu, Song Liu, and Jian Liu. 2019. A session-packets-based encrypted traffic classification using capsule neural networks. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE, 429--436."},{"key":"e_1_2_1_32_1","volume-title":"Towards efficient image-based representation of tabular data. Neural Computing and Applications","author":"Damri Amit","year":"2023","unstructured":"Amit Damri, Mark Last, and Niv Cohen. 2023. Towards efficient image-based representation of tabular data. Neural Computing and Applications (2023), 1--21."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2726381.2726907"},{"key":"e_1_2_1_34_1","volume-title":"Gorby Kabasele Ndonda, and Ramin Sadre","author":"De Keersmaeker Francc","year":"2023","unstructured":"Francc ois De Keersmaeker, Yinan Cao, Gorby Kabasele Ndonda, and Ramin Sadre. 2023. A Survey of Public IoT Datasets for Network Security Research. IEEE Communications Surveys & Tutorials (2023)."},{"key":"e_1_2_1_35_1","unstructured":"Tcpreplay Developers. 2023. Tcpreplay. https:\/\/tcpreplay.appneta.com\/."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948214"},{"key":"e_1_2_1_37_1","volume-title":"Adversarial audio synthesis. arXiv preprint arXiv:1802.04208","author":"Donahue Chris","year":"2018","unstructured":"Chris Donahue, Julian McAuley, and Miller Puckette. 2018a. Adversarial audio synthesis. arXiv preprint arXiv:1802.04208 (2018)."},{"key":"e_1_2_1_38_1","unstructured":"Chris Donahue Julian McAuley and Miller Puckette. 2018b. Synthesizing audio with GANs. (2018)."},{"key":"e_1_2_1_39_1","unstructured":"Yoav Freund Robert E Schapire et al. 1996. Experiments with a new boosting algorithm. In icml Vol. 96. Citeseer 148--156."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.013"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01043"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105444"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35532-0_4"},{"key":"e_1_2_1_44_1","volume-title":"ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks","author":"He Haibo","year":"2008","unstructured":"Haibo He, Yang Bai, Edwardo A Garcia, and Shutao Li. 2008. ADASYN: Adaptive synthetic sampling approach for imbalanced learning. In 2008 IEEE international joint conference on neural networks (IEEE world congress on computational intelligence). Ieee, 1322--1328."},{"key":"e_1_2_1_45_1","volume-title":"Network simulations with the ns-3 simulator. SIGCOMM demonstration","author":"Henderson Thomas R","year":"2008","unstructured":"Thomas R Henderson, Mathieu Lacage, George F Riley, Craig Dowell, and Joseph Kopena. 2008. Network simulations with the ns-3 simulator. SIGCOMM demonstration, Vol. 14, 14 (2008), 527."},{"key":"e_1_2_1_46_1","unstructured":"Jonathan Ho William Chan Chitwan Saharia Jay Whang Ruiqi Gao Alexey Gritsenko Diederik P Kingma Ben Poole Mohammad Norouzi David J Fleet et al. 2022a. Imagen video: High definition video generation with diffusion models. arXiv preprint arXiv:2210.02303 (2022)."},{"key":"e_1_2_1_47_1","volume-title":"Denoising diffusion probabilistic models. Advances in neural information processing systems","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in neural information processing systems , Vol. 33 (2020), 6840--6851."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/3586589.3586636"},{"key":"e_1_2_1_49_1","volume-title":"Video diffusion models. arXiv preprint arXiv:2204.03458","author":"Ho Jonathan","year":"2022","unstructured":"Jonathan Ho, Tim Salimans, Alexey Gritsenko, William Chan, Mohammad Norouzi, and David J Fleet. 2022c. Video diffusion models. arXiv preprint arXiv:2204.03458 (2022)."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"e_1_2_1_51_1","volume-title":"Lora: Low-rank adaptation of large language models. arXiv preprint arXiv:2106.09685","author":"Hu Edward J","year":"2021","unstructured":"Edward J Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Lu Wang, and Weizhu Chen. 2021. Lora: Low-rank adaptation of large language models. arXiv preprint arXiv:2106.09685 (2021)."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282426"},{"key":"e_1_2_1_53_1","volume-title":"Automating Internet of Things network traffic collection with robotic arm interactions. arXiv preprint arXiv:2110.00060","author":"Jiang Xi","year":"2021","unstructured":"Xi Jiang and Noah Apthorpe. 2021. Automating Internet of Things network traffic collection with robotic arm interactions. arXiv preprint arXiv:2110.00060 (2021)."},{"key":"e_1_2_1_54_1","volume-title":"AC-DC: Adaptive Ensemble Classification for Network Traffic Identification. arXiv preprint arXiv:2302.11718","author":"Jiang Xi","year":"2023","unstructured":"Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, and Nick Feamster. 2023. AC-DC: Adaptive Ensemble Classification for Network Traffic Identification. arXiv preprint arXiv:2302.11718 (2023)."},{"key":"e_1_2_1_55_1","unstructured":"Xi Jiang Saloua Naama Shinan Liu Francesco Bronzino Paul Schmitt and Nick Feamster. [n. d.]. Towards Designing Robust and Efficient Classifiers for Encrypted Traffic in the Modern Internet. ( [n. d.])."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00976"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.17762\/itii.v9i2.419"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102022"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.07.015"},{"key":"e_1_2_1_62_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Klein Amit","year":"2019","unstructured":"Amit Klein and Benny Pinkas. 2019. From $$IP$$$$ID$$ to Device $$ID$$ and $$KASLR$$ Bypass. In 28th USENIX Security Symposium (USENIX Security 19). 1063--1080."},{"key":"e_1_2_1_63_1","volume-title":"A Survey on Generative Diffusion Models for Structured Data. arXiv preprint arXiv:2306.04139","author":"Koo Heejoon","year":"2023","unstructured":"Heejoon Koo. 2023. A Survey on Generative Diffusion Models for Structured Data. arXiv preprint arXiv:2306.04139 (2023)."},{"key":"e_1_2_1_64_1","volume-title":"TabDDPM: Modelling Tabular Data with Diffusion Models. arXiv preprint arXiv:2209.15421","author":"Kotelnikov Akim","year":"2022","unstructured":"Akim Kotelnikov, Dmitry Baranchuk, Ivan Rubachev, and Artem Babenko. 2022. TabDDPM: Modelling Tabular Data with Diffusion Models. arXiv preprint arXiv:2209.15421 (2022)."},{"key":"e_1_2_1_65_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems , Vol. 25 (2012)."},{"key":"e_1_2_1_66_1","volume-title":"Internet traffic and content consolidation. 77th Internet Engineering Task Force","author":"Labovitz Craig","year":"2010","unstructured":"Craig Labovitz, S Iekel-Johnson, D McPherson, J Oberheide, and F Jahanian. 2010. Internet traffic and content consolidation. 77th Internet Engineering Task Force (2010)."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190455.1190467"},{"key":"e_1_2_1_68_1","volume-title":"Australian Telecommunications Networks & Applications Conference","volume":"2003","author":"Lang Tanja","year":"2003","unstructured":"Tanja Lang, Grenville Armitage, Phillip Branch, and Hwan-Yi Choo. 2003. A synthetic traffic model for Half-Life. In Australian Telecommunications Networks & Applications Conference, Vol. 2003."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067343.1067373"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423643"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588941"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580818"},{"key":"e_1_2_1_73_1","volume-title":"2023 c. Grounding dino: Marrying dino with grounded pre-training for open-set object detection. arXiv preprint arXiv:2303.05499","author":"Liu Shilong","year":"2023","unstructured":"Shilong Liu, Zhaoyang Zeng, Tianhe Ren, Feng Li, Hao Zhang, Jie Yang, Chunyuan Li, Jianwei Yang, Hang Su, Jun Zhu, et al. 2023 c. Grounding dino: Marrying dino with grounded pre-training for open-set object detection. arXiv preprint arXiv:2303.05499 (2023)."},{"key":"e_1_2_1_74_1","first-page":"1","article-title":"Synthetic data augmentation using multiscale attention CycleGAN for aircraft detection in remote sensing images","volume":"19","author":"Liu Weixing","year":"2021","unstructured":"Weixing Liu, Bin Luo, and Jun Liu. 2021. Synthetic data augmentation using multiscale attention CycleGAN for aircraft detection in remote sensing images. IEEE Geoscience and Remote Sensing Letters , Vol. 19 (2021), 1--5.","journal-title":"IEEE Geoscience and Remote Sensing Letters"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD51990.2021.9459072"},{"key":"e_1_2_1_77_1","volume-title":"Proc. icml","volume":"30","author":"Maas Andrew L","year":"2013","unstructured":"Andrew L Maas, Awni Y Hannun, Andrew Y Ng, et al. 2013. Rectifier nonlinearities improve neural network acoustic models. In Proc. icml, Vol. 30. Atlanta, GA, 3."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487842"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952601"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-021-01738-7"},{"key":"e_1_2_1_83_1","volume-title":"International conference on machine learning. PMLR, 3481--3490","author":"Mescheder Lars","year":"2018","unstructured":"Lars Mescheder, Andreas Geiger, and Sebastian Nowozin. 2018. Which training methods for GANs do actually converge?. In International conference on machine learning. PMLR, 3481--3490."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.006"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_2_1_86_1","volume-title":"Emerging Research in Computing, Information, Communication and Applications: ERCICA","author":"Negandhi Prashil","year":"2018","unstructured":"Prashil Negandhi, Yash Trivedi, and Ramchandra Mangrulkar. 2019. Intrusion detection system using random forest on the NSL-KDD dataset. In Emerging Research in Computing, Information, Communication and Applications: ERCICA 2018, Volume 2. Springer, 519--531."},{"key":"e_1_2_1_87_1","volume-title":"Glide: Towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741","author":"Nichol Alex","year":"2021","unstructured":"Alex Nichol, Prafulla Dhariwal, Aditya Ramesh, Pranav Shyam, Pamela Mishkin, Bob McGrew, Ilya Sutskever, and Mark Chen. 2021. Glide: Towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021)."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001494"},{"key":"e_1_2_1_89_1","unstructured":"OpenAI. 2023. Dall E 3. https:\/\/openai.com\/dall-e-3\/."},{"key":"e_1_2_1_90_1","volume-title":"Drag Your GAN: Interactive Point-based Manipulation on the Generative Image Manifold. In ACM SIGGRAPH 2023 Conference Proceedings.","author":"Pan Xingang","year":"2023","unstructured":"Xingang Pan, Ayush Tewari, Thomas Leimk\u00fchler, Lingjie Liu, Abhimitra Meka, and Christian Theobalt. 2023. Drag Your GAN: Interactive Point-based Manipulation on the Generative Image Manifold. In ACM SIGGRAPH 2023 Conference Proceedings."},{"key":"e_1_2_1_91_1","volume-title":"Diffusevae: Efficient, controllable and high-fidelity generation from low-dimensional latents. arXiv preprint arXiv:2201.00308","author":"Pandey Kushagra","year":"2022","unstructured":"Kushagra Pandey, Avideep Mukherjee, Piyush Rai, and Abhishek Kumar. 2022. Diffusevae: Efficient, controllable and high-fidelity generation from low-dimensional latents. arXiv preprint arXiv:2201.00308 (2022)."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.330413"},{"key":"e_1_2_1_93_1","volume-title":"Hierarchical text-conditional image generation with clip latents","author":"Ramesh Aditya","year":"2022","unstructured":"Aditya Ramesh, Prafulla Dhariwal, Alex Nichol, Casey Chu, and Mark Chen. 2022. Hierarchical text-conditional image generation with clip latents, 2022. URL https:\/\/arxiv. org\/abs\/2204.06125 , Vol. 7 (2022)."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1615-5"},{"key":"e_1_2_1_95_1","volume-title":"Tom Van Goethem, and Wouter Joosen","author":"Rimmer Vera","year":"2017","unstructured":"Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2017. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"e_1_2_1_98_1","volume-title":"2018 international conference on networking, embedded and wireless systems (ICNEWS). IEEE, 1--5.","author":"Rohith R","year":"2018","unstructured":"R Rohith, Minal Moharir, G Shobha, et al. 2018. SCAPY-A powerful interactive packet manipulation program. In 2018 international conference on networking, embedded and wireless systems (ICNEWS). IEEE, 1--5."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_2_1_100_1","volume-title":"Md Murad Ali, and Md Ashraful Islam","author":"Roy Sujan Chandra","year":"2019","unstructured":"Sujan Chandra Roy, Md Murad Ali, and Md Ashraful Islam. 2019. Analysis the effect of transmission cost on TTL and number of nodes in social aware routing protocols. group, Vol. 20, 40 (2019), 60--80."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","unstructured":"Nataniel Ruiz Yuanzhen Li Varun Jampani Yael Pritch Michael Rubinstein and Kfir Aberman. 2023. DreamBooth: Fine Tuning Text-to-Image Diffusion Models for Subject-Driven Generation. https:\/\/doi.org\/10.48550\/arXiv.2208.12242 arXiv:2208.12242 [cs].","DOI":"10.48550\/arXiv.2208.12242"},{"key":"e_1_2_1_102_1","first-page":"36479","article-title":"Photorealistic text-to-image diffusion models with deep language understanding","volume":"35","author":"Saharia Chitwan","year":"2022","unstructured":"Chitwan Saharia, William Chan, Saurabh Saxena, Lala Li, Jay Whang, Emily L Denton, Kamyar Ghasemipour, Raphael Gontijo Lopes, Burcu Karagol Ayan, Tim Salimans, et al. 2022. Photorealistic text-to-image diffusion models with deep language understanding. Advances in Neural Information Processing Systems , Vol. 35 (2022), 36479--36494.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_103_1","first-page":"25278","article-title":"Laion-5b: An open large-scale dataset for training next generation image-text models","volume":"35","author":"Schuhmann Christoph","year":"2022","unstructured":"Christoph Schuhmann, Romain Beaumont, Richard Vencu, Cade Gordon, Ross Wightman, Mehdi Cherti, Theo Coombes, Aarush Katta, Clayton Mullis, Mitchell Wortsman, et al. 2022. Laion-5b: An open large-scale dataset for training next generation image-text models. Advances in Neural Information Processing Systems , Vol. 35 (2022), 25278--25294.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01120"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505214"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"e_1_2_1_107_1","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp , Vol. 1 (2018), 108--116.","journal-title":"ICISSp"},{"key":"e_1_2_1_108_1","volume-title":"An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition","author":"Shi Baoguang","year":"2016","unstructured":"Baoguang Shi, Xiang Bai, and Cong Yao. 2016. An end-to-end trainable neural network for image-based sequence recognition and its application to scene text recognition. IEEE transactions on pattern analysis and machine intelligence, Vol. 39, 11 (2016), 2298--2304."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","unstructured":"Yujun Shi Chuhui Xue Jiachun Pan Wenqing Zhang Vincent Y. F. Tan and Song Bai. 2023. DragDiffusion: Harnessing Diffusion Models for Interactive Point-based Image Editing. https:\/\/doi.org\/10.48550\/arXiv.2306.14435 arXiv:2306.14435 [cs].","DOI":"10.48550\/arXiv.2306.14435"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00536-8_1"},{"key":"e_1_2_1_111_1","volume-title":"NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging. arXiv preprint arXiv:2310.04429","author":"Sivaroopan Nirhoshan","year":"2023","unstructured":"Nirhoshan Sivaroopan, Dumindu Bandara, Chamara Madarasingha, Guilluame Jourjon, Anura Jayasumana, and Kanchana Thilakarathna. 2023. NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging. arXiv preprint arXiv:2310.04429 (2023)."},{"key":"e_1_2_1_112_1","volume-title":"International conference on machine learning. PMLR, 2256--2265","author":"Sohl-Dickstein Jascha","year":"2015","unstructured":"Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan, and Surya Ganguli. 2015. Deep unsupervised learning using nonequilibrium thermodynamics. In International conference on machine learning. PMLR, 2256--2265."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/1012888.1005733"},{"key":"e_1_2_1_115_1","volume-title":"Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502","author":"Song Jiaming","year":"2020","unstructured":"Jiaming Song, Chenlin Meng, and Stefano Ermon. 2020. Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)."},{"key":"e_1_2_1_116_1","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Song Jiaming","year":"2017","unstructured":"Jiaming Song, Shengjia Zhao, and Stefano Ermon. 2017. A-nice-mc: Adversarial training for mcmc. Advances in Neural Information Processing Systems , Vol. 30 (2017)."},{"key":"e_1_2_1_117_1","volume-title":"Generative modeling by estimating gradients of the data distribution. Advances in neural information processing systems","author":"Song Yang","year":"2019","unstructured":"Yang Song and Stefano Ermon. 2019. Generative modeling by estimating gradients of the data distribution. Advances in neural information processing systems , Vol. 32 (2019)."},{"key":"e_1_2_1_118_1","volume-title":"When the CRC and TCP checksum disagree. ACM SIGCOMM computer communication review","author":"Stone Jonathan","year":"2000","unstructured":"Jonathan Stone and Craig Partridge. 2000. When the CRC and TCP checksum disagree. ACM SIGCOMM computer communication review , Vol. 30, 4 (2000), 309--319."},{"key":"e_1_2_1_119_1","volume-title":"Proceedings of USENIX.","author":"Sullivan Mark","year":"1998","unstructured":"Mark Sullivan and Andrew Heybey. 1998. A system for managing large databases of network traffic. In Proceedings of USENIX."},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391542"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2018.8474209"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_2_1_123_1","volume-title":"A survey of intrusion detection models based on NSL-KDD data set. 2018 Fifth HCT Information Technology Trends (ITT)","author":"Thomas Rajesh","year":"2018","unstructured":"Rajesh Thomas and Deepa Pavithran. 2018. A survey of intrusion detection models based on NSL-KDD data set. 2018 Fifth HCT Information Technology Trends (ITT) (2018), 286--291."},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.101"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504761"},{"key":"e_1_2_1_126_1","volume-title":"SSENet-2011: a network intrusion detection system dataset and its comparison with KDD CUP 99 dataset. In 2011 second asian himalayas international conference on internet (AH-ICI)","author":"Vasudevan Ri","unstructured":"ARi Vasudevan, E Harshini, and S Selvakumar. 2011. SSENet-2011: a network intrusion detection system dataset and its comparison with KDD CUP 99 dataset. In 2011 second asian himalayas international conference on internet (AH-ICI). IEEE, 1--5."},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020830"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC51575.2020.9344978"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2019.2950099"},{"key":"e_1_2_1_130_1","volume-title":"Visual chatgpt: Talking, drawing and editing with visual foundation models. arXiv preprint arXiv:2303.04671","author":"Wu Chenfei","year":"2023","unstructured":"Chenfei Wu, Shengming Yin, Weizhen Qi, Xiaodong Wang, Zecheng Tang, and Nan Duan. 2023. Visual chatgpt: Talking, drawing and editing with visual foundation models. arXiv preprint arXiv:2303.04671 (2023)."},{"key":"e_1_2_1_131_1","volume-title":"Modeling tabular data using conditional gan. Advances in neural information processing systems","author":"Xu Lei","year":"2019","unstructured":"Lei Xu, Maria Skoularidou, Alfredo Cuesta-Infante, and Kalyan Veeramachaneni. 2019. Modeling tabular data using conditional gan. Advances in neural information processing systems , Vol. 32 (2019)."},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87839-9_1"},{"key":"e_1_2_1_133_1","volume-title":"Identification of encrypted traffic through attention mechanism based long short term memory","author":"Yao Haipeng","year":"2019","unstructured":"Haipeng Yao, Chong Liu, Peiying Zhang, Sheng Wu, Chunxiao Jiang, and Shui Yu. 2019. Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Transactions on Big Data (2019)."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544251"},{"key":"e_1_2_1_135_1","unstructured":"Sebastian Zander David Kennedy and Grenville Armitage. 2005. Kute A high performance kernel-based udp traffic engine. (2005)."},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01102"},{"key":"e_1_2_1_137_1","volume-title":"2023 b. Text-to-image diffusion model in generative ai: A survey. arXiv preprint arXiv:2303.07909","author":"Zhang Chenshuang","year":"2023","unstructured":"Chenshuang Zhang, Chaoning Zhang, Mengchun Zhang, and In So Kweon. 2023 b. Text-to-image diffusion model in generative ai: A survey. arXiv preprint arXiv:2303.07909 (2023)."},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633055"},{"key":"e_1_2_1_140_1","unstructured":"Shihao Zhao Dongdong Chen Yen-Chun Chen Jianmin Bao Shaozhe Hao Lu Yuan and Kwan-Yee K. Wong. 2023. Uni-ControlNet: All-in-One Control to Text-to-Image Diffusion Models. http:\/\/arxiv.org\/abs\/2305.16322 arXiv:2305.16322 [cs]."},{"key":"e_1_2_1_141_1","volume-title":"MTT: an model for encrypted network traffic classification using multi-task transformer. Applied Intelligence","author":"Zheng Weiping","year":"2022","unstructured":"Weiping Zheng, Jianhao Zhong, Qizhi Zhang, and Gansen Zhao. 2022. MTT: an model for encrypted network traffic classification using multi-task transformer. Applied Intelligence (2022), 1--16."},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58589-1_34"},{"key":"e_1_2_1_143_1","volume-title":"Converting tabular data into images for deep learning with convolutional neural networks. Scientific reports","author":"Zhu Yitan","year":"2021","unstructured":"Yitan Zhu, Thomas Brettin, Fangfang Xia, Alexander Partin, Maulik Shukla, Hyunseung Yoo, Yvonne A Evrard, James H Doroshow, and Rick L Stevens. 2021. Converting tabular data into images for deep learning with convolutional neural networks. Scientific reports, Vol. 11, 1 (2021), 11325."},{"key":"e_1_2_1_144_1","unstructured":"Yuanzhi Zhu Zhaohai Li Tianwei Wang Mengchao He and Cong Yao. [n. d.]. Conditional Text Image Generation With Diffusion Models. ( [n. d.]). io"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:38:50Z","timestamp":1755913130000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,16]]},"references-count":144,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2,16]]}},"alternative-id":["10.1145\/3639037"],"URL":"https:\/\/doi.org\/10.1145\/3639037","relation":{},"ISSN":["2476-1249"],"issn-type":[{"value":"2476-1249","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,16]]},"assertion":[{"value":"2024-02-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}