{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:10Z","timestamp":1755974410319,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"RICS2: Resilient Information and Control Systems"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3722041.3723098","type":"proceedings-article","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T07:16:25Z","timestamp":1743578185000},"page":"33-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Snort Meets Transformers: Accelerating Transformer-Based Network Traffic Classification for Real-Time Performance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1852-0998","authenticated-orcid":false,"given":"Mohamed Hashim","family":"Changrampadi","sequence":"first","affiliation":[{"name":"Chalmers University of Technology and University of Gothenburg, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3383-9617","authenticated-orcid":false,"given":"Magnus","family":"Almgren","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology and University of Gothenburg, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0303-3858","authenticated-orcid":false,"given":"Pablo","family":"Picazo-Sanchez","sequence":"additional","affiliation":[{"name":"School of Information Technology, Halmstad University, Halmstad, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2774-9284","authenticated-orcid":false,"given":"Ahmed","family":"Ali-Eldin","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology and University of Gothenburg, Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.29"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"volume-title":"ICLR 2021: 9th International Conference on Learning Representations (2021)","author":"Dosovitskiy A.","key":"e_1_3_2_1_3_1","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., Houlsby, N.: An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. In: ICLR 2021: 9th International Conference on Learning Representations (2021)"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607206"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.23919\/ITUK50268.2020.9303204"},{"key":"e_1_3_2_1_6_1","first-page":"256","volume-title":"2012 Second International Conference on Digital Information and Communication Technology and Its Applications (DICTAP).","author":"Hussein S.M.","year":"2012","unstructured":"Hussein, S.M., Mohd Ali, F.H., Kasiran, Z.: Evaluation Effectiveness of Hybrid IDS Using Snort with Naive Bayes to Detect Attacks. In: 2012 Second International Conference on Digital Information and Communication Technology and Its Applications (DICTAP). p. 256--260. IEEE (2012)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"1999","volume":"24","author":"Lotfollahi M.","year":"2020","unstructured":"Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R., Saberian, M.: Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. Soft Computing 24(3), 1999--2012 (2020)","journal-title":"Encrypted Traffic Classification Using Deep Learning. Soft Computing"},{"key":"e_1_3_2_1_9_1","volume-title":"Thing","author":"Lu Z.","year":"2022","unstructured":"Lu, Z., Thing, V.L.: How Does It Detect a Malicious App? Explaining the Predictions of AI-based Malware Detector. In: 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing (HPSC) and IEEE Intl Conference on Intelligent Data and Security(IDS). p. 194--199. IEEE(2022)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0138-9"},{"key":"e_1_3_2_1_11_1","first-page":"4765","volume-title":"Advances in Neural Information Processing Systems 30","author":"Lundberg S.M.","year":"2017","unstructured":"Lundberg, S.M., Lee, S.I.: A Unified Approach to Interpreting Model Predictions. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems 30, p. 4765--4774. Curran Associates, Inc. (2017)"},{"key":"e_1_3_2_1_12_1","volume-title":"LISA.","author":"Roesch M.","year":"1999","unstructured":"Roesch, M.: Snort: Lightweight intrusion detection for networks. In: LISA. vol. 99, p. 229--238 (1999)"},{"key":"e_1_3_2_1_13_1","first-page":"108","volume":"1","author":"Sharafaldin I.","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108--116 (2018)","journal-title":"ICISSp"},{"key":"e_1_3_2_1_14_1","first-page":"3145","volume-title":"A.: Learning Important Features Through Propagating Activation Differences. In: International Conference on Machine Learning.","author":"Shrikumar A.","year":"2017","unstructured":"Shrikumar, A., Greenside, P., Kundaje, A.: Learning Important Features Through Propagating Activation Differences. In: International Conference on Machine Learning. p. 3145--3153. PMLR (2017)"},{"key":"e_1_3_2_1_15_1","volume-title":"Dahal","author":"Ujjan R.M.A.","year":"2018","unstructured":"Ujjan, R.M.A., Pervez, Z., Dahal, K.: Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). p. 915--920. IEEE (2018)"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP61940.2024.10858569"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_2_1_18_1","volume-title":"Matthews","author":"White J.S.","year":"2013","unstructured":"White, J.S., Fitzsimmons, T., Matthews, J.N.: Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In: Cyber Sensing 2013. vol. 8757, p. 10--21. SPIE (2013)"},{"key":"e_1_3_2_1_19_1","first-page":"109965","volume":"235","author":"Xu Y.","year":"2023","unstructured":"Xu, Y., Cao, J., Song, K., Xiang, Q., Cheng, G.: FastTraffic: A Lightweight Method for Encrypted Traffic Fast Classification. Computer Networks 235, 109965 (2023)","journal-title":"Encrypted Traffic Fast Classification. Computer Networks"},{"key":"e_1_3_2_1_20_1","first-page":"8","volume-title":"M.: A Hybrid Network Intrusion Detection Technique Using Random Forests. In: First International Conference on Availability, Reliability and Security (ARES'06)","author":"Zhang J.","unstructured":"Zhang, J., Zulkernine, M.: A Hybrid Network Intrusion Detection Technique Using Random Forests. In: First International Conference on Availability, Reliability and Security (ARES'06). pp. 8-pp. IEEE (2006)"},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"5420","volume":"37","author":"Zhao R.","year":"2023","unstructured":"Zhao, R., Zhan, M., Deng, X., Wang, Y., Wang, Y., Gui, G., Xue, Z.: Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation. Proceedings of the AAAI Conference on Artificial Intelligence 37(4), 5420--5427 (2023)","journal-title":"Artificial Intelligence"}],"event":{"name":"EuroSys '25: Twentieth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Rotterdam Netherlands","acronym":"EuroSys '25"},"container-title":["Proceedings of the 18th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722041.3723098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3722041.3723098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:14:55Z","timestamp":1755972895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3722041.3723098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":21,"alternative-id":["10.1145\/3722041.3723098","10.1145\/3722041"],"URL":"https:\/\/doi.org\/10.1145\/3722041.3723098","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-04-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}