{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:32:57Z","timestamp":1773840777198,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3672198.3673796","type":"proceedings-article","created":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T12:24:10Z","timestamp":1721132650000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["PCAPVision: PCAP-Based High-Velocity and Large-Volume Network Failure Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5655-8803","authenticated-orcid":false,"given":"Lukasz","family":"Tulczyjew","sequence":"first","affiliation":[{"name":"B-Yond, Warsaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6850-6465","authenticated-orcid":false,"given":"Ihor","family":"Biruk","sequence":"additional","affiliation":[{"name":"B-Yond, Wroc\u0142aw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2848-7398","authenticated-orcid":false,"given":"Murat","family":"Bilgic","sequence":"additional","affiliation":[{"name":"B-Yond, Redmond, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0018-7832","authenticated-orcid":false,"given":"Charles","family":"Abondo","sequence":"additional","affiliation":[{"name":"B-Yond, Montreal, Quebec, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4292-1188","authenticated-orcid":false,"given":"Nathanael","family":"Weill","sequence":"additional","affiliation":[{"name":"B-Yond, Montreal, Quebec, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103000"},{"key":"e_1_3_2_1_2_1","volume-title":"Jun","author":"Tulczyjew L.","year":"2024","unstructured":"L. Tulczyjew, K. Jarrah, C. Abondo, D. Bennett, and N. Weill, \"LLMcap: Large Language Model for Unsupervised PCAP Failure Detection,\" in Workshop on the Impact of Large Language Models on 6G Networks (ICC), Jun 2024. Accepted."},{"key":"e_1_3_2_1_3_1","first-page":"712","volume-title":"Malware traffic classification using convolutional neural network for representation learning,\" in 2017 International conference on information networking (ICOIN)","author":"Wang W.","year":"2017","unstructured":"W. Wang, M. Zhu, X. Zeng, X. Ye, and Y. Sheng, \"Malware traffic classification using convolutional neural network for representation learning,\" in 2017 International conference on information networking (ICOIN), pp. 712--717, IEEE, 2017."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Iot dos and ddos attack detection using resnet,\" in 2020 IEEE 23rd International Multitopic Conference (INMIC)","author":"Hussain F.","year":"2020","unstructured":"F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, and G. A. Shah, \"Iot dos and ddos attack detection using resnet,\" in 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1--6, IEEE, 2020."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Reliability and Security","author":"Agrafiotis G.","year":"2022","unstructured":"G. Agrafiotis, E. Makri, I. Flionis, A. Lalas, K. Votis, and D. Tzovaras, \"Image-based neural network models for malware traffic classification using pcap to picture conversion,\" in Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1--7, 2022."},{"key":"e_1_3_2_1_6_1","volume-title":"Classifying malware traffic using images and deep convolutional neural network,\" IEEE Access","author":"Davis R.","year":"2024","unstructured":"R. Davis, J. Xu, and K. Roy, \"Classifying malware traffic using images and deep convolutional neural network,\" IEEE Access, 2024."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1803839115"},{"key":"e_1_3_2_1_8_1","volume-title":"PMLR","author":"Serra J.","year":"2018","unstructured":"J. Serra, D. Suris, M. Miron, and A. Karatzoglou, \"Overcoming catastrophic forgetting with hard attention to the task,\" in International conference on machine learning, pp. 4548--4557, PMLR, 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"Pathnet: Evolution channels gradient descent in super neural networks,\" arXiv preprint arXiv:1701.08734","author":"Fernando C.","year":"2017","unstructured":"C. Fernando, D. Banarse, C. Blundell, Y. Zwols, D. Ha, A. A. Rusu, A. Pritzel, and D. Wierstra, \"Pathnet: Evolution channels gradient descent in super neural networks,\" arXiv preprint arXiv:1701.08734, 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_3_2_1_11_1","volume-title":"Experience replay for continual learning,\" Advances in neural information processing systems","author":"Rolnick D.","year":"2019","unstructured":"D. Rolnick, A. Ahuja, J. Schwarz, T. Lillicrap, and G. Wayne, \"Experience replay for continual learning,\" Advances in neural information processing systems, vol. 32, 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.01.012"},{"key":"e_1_3_2_1_13_1","volume-title":"The exploding gradient problem demystified-definition, prevalence, impact, origin, tradeoffs, and solutions,\" arXiv preprint arXiv:1712.05577","author":"Philipp G.","year":"2017","unstructured":"G. Philipp, D. Song, and J. G. Carbonell, \"The exploding gradient problem demystified-definition, prevalence, impact, origin, tradeoffs, and solutions,\" arXiv preprint arXiv:1712.05577, 2017."},{"key":"e_1_3_2_1_14_1","first-page":"1310","volume-title":"On the difficulty of training recurrent neural networks,\" in International conference on machine learning","author":"Pascanu R.","year":"2013","unstructured":"R. Pascanu, T. Mikolov, and Y. Bengio, \"On the difficulty of training recurrent neural networks,\" in International conference on machine learning, pp. 1310--1318, Pmlr, 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"Normalization: A preprocessing stage,\" arXiv preprint arXiv:1503.06462","author":"Patro S.","year":"2015","unstructured":"S. Patro and K. K. Sahu, \"Normalization: A preprocessing stage,\" arXiv preprint arXiv:1503.06462, 2015."},{"key":"e_1_3_2_1_16_1","first-page":"189","volume-title":"Taipei","author":"Park S.","year":"2016","unstructured":"S. Park and N. Kwak, \"Analysis on the dropout effect in convolutional neural networks,\" in Computer Vision-ACCV 2016: 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II 13, pp. 189--204, Springer, 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"Adam: A method for stochastic optimization,\" arXiv preprint arXiv:1412.6980","author":"Kingma D. P.","year":"2014","unstructured":"D. P. Kingma and J. Ba, \"Adam: A method for stochastic optimization,\" arXiv preprint arXiv:1412.6980, 2014."},{"issue":"10","key":"e_1_3_2_1_18_1","article-title":"Binary cross entropy with deep learning technique for image classification","volume":"9","author":"Ruby U.","year":"2020","unstructured":"U. Ruby and V. Yendapalli, \"Binary cross entropy with deep learning technique for image classification,\" Int. J. Adv. Trends Comput. Sci. Eng, vol. 9, no. 10, 2020.","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng"},{"issue":"4","key":"e_1_3_2_1_19_1","first-page":"39","article-title":"Accelerating the machine learning lifecycle with mlflow","volume":"41","author":"Zaharia M.","year":"2018","unstructured":"M. Zaharia, A. Chen, A. Davidson, A. Ghodsi, S. A. Hong, A. Konwinski, S. Murching, T. Nykodym, P. Ogilvie, M. Parkhe, et al., \"Accelerating the machine learning lifecycle with mlflow.,\" IEEE Data Eng. Bull., vol. 41, no. 4, pp. 39--45, 2018.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_20_1","unstructured":"Wireshark Project \"editcap - Edit and\/or translate the format of capture files.\" https:\/\/www.wireshark.org\/docs\/man-pages\/editcap.html 2024. Accessed: 2024-05-27."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2020.12.1342"}],"event":{"name":"ACM SIGCOMM '24: ACM SIGCOMM 2024 Conference","location":"Sydney NSW Australia","acronym":"ACM SIGCOMM '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2024 SIGCOMM Workshop on Networks for AI Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672198.3673796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672198.3673796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:15:45Z","timestamp":1755972945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672198.3673796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":22,"alternative-id":["10.1145\/3672198.3673796","10.1145\/3672198"],"URL":"https:\/\/doi.org\/10.1145\/3672198.3673796","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}