Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link

Related Topics

  • Packet Header
  • Packet Header
  • IP Packets
  • IP Packets

Articles published on Packet payload

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
278 Search results
Sort by
Recency
  • Research Article
  • 10.31891/2307-5732-2025-355-56
МЕТОД ПІДВИЩЕННЯ ОЦІНЮВАННЯ ПРОДУКТИВНОСТІ ВУЗЬКОСМУГОВИХ БЕЗПРОВОДОВИХ СІТЧАСТИХ МЕРЕЖ
  • Aug 28, 2025
  • Herald of Khmelnytskyi National University. Technical sciences
  • Ярослав Міхненко + 1 more

The article deals with the problem of evaluating the performance of narrowband wireless mesh networks, which are the basis for creating highly reliable communication systems in conditions of limited radio frequency spectrum resources. Particular attention is paid to the study of the peculiarities of network operation in the relay node modes. It is established that the efficiency of narrowband wireless mesh networks significantly depends on the settings of data transmission parameters: message size, modulation rate, use of short acknowledgments and direct error correction mechanisms. A systematic approach to evaluating the key parameters of network performance is proposed: data transmission rate, packet transmission time, probability of successful message delivery, and calculation relations for determining the packet transmission time and payload bitrate with regard to service information are given. Particular attention is paid to the mechanism of confirming the delivery of packets through a short message of confirmation of receipt of a data packet, in particular, the impact of retransmissions on the overall network throughput. It is shown that the use of direct error correction schemes helps to reduce the impact of radio channel interference and improve communication reliability, but increases the overall data transmission time. The results of the study allow us to formulate recommendations for optimizing network parameters and demonstrate a clear relationship between transmission characteristics and network performance to ensure guaranteed message delivery. The obtained measurements of key parameters provide the basis for an objective and accelerated analysis of the performance of narrowband wireless mesh networks in applied conditions, and also confirm the feasibility of using the proposed approach to improve the accuracy and informativeness of the assessment.

  • Research Article
  • Cite Count Icon 1
  • 10.3390/electronics14040778
Fine-Grained Encrypted Traffic Classification Using Dual Embedding and Graph Neural Networks
  • Feb 17, 2025
  • Electronics
  • Zhengyang Liu + 3 more

Encrypted traffic classification poses significant challenges in network security due to the growing use of encryption protocols, which obscure packet payloads. This paper introduces a novel framework that leverages dual embedding mechanisms and Graph Neural Networks (GNNs) to model both temporal and spatial dependencies in traffic flows. By utilizing metadata features such as packet size, inter-arrival times, and protocol attributes, the framework achieves robust classification without relying on payload content. The proposed framework demonstrates an average classification accuracy of 96.7%, F1-score of 96.0%, and AUC-ROC of 97.9% across benchmark datasets, including ISCX VPN-nonVPN, QUIC, and USTC-TFC2016. These results mark an improvement of up to 8% in F1-score and 10% in AUC-ROC compared to state-of-the-art baselines. Extensive experiments validate the framework’s scalability and robustness, confirming its potential for real-world applications like intrusion detection and network monitoring. The integration of dual embedding mechanisms and GNNs allows for accurate fine-grained classification of encrypted traffic flows, addressing critical challenges in modern network security.

  • Research Article
  • Cite Count Icon 1
  • 10.3390/electronics14010088
ORNIC: A High-Performance RDMA NIC with Out-of-Order Packet Direct Write Method for Multipath Transmission
  • Dec 28, 2024
  • Electronics
  • Jiandong Ma + 6 more

Remote Direct Memory Access (RDMA) technology provides a low-latency, high-bandwidth, and CPU-bypassed method for data transmission between servers. Recent works have proved that multipath transmission, especially packet spraying, can avoid network congestion, achieve load balancing, and improve overall performance in data center networks (DCNs). Multipath transmission can result in out-of-order (OOO) packet delivery. However, existing RDMA transport protocols, such as RDMA over Converged Ethernet version 2 (RoCEv2), are designed for handling sequential packets, limiting their ability to support multipath transmission. To address this issue, in this study, we propose ORNIC, a high-performance RDMA Network Interface Card (NIC) with out-of-order packet direct write method for multipath transmission. ORNIC supports both in-order and out-of-order packet reception. The payload of OOO packets is written directly to user memory without reordering. The write address is embedded in the packets only when necessary. A bitmap is used to check data integrity and detect packet loss. We redesign the bitmap structure into an array of bitmap blocks that support dynamic allocation. Once a bitmap block is full, it is marked and can be freed in advance. We implement ORNIC on a Xilinx U200 FPGA (Field-Programmable Gate Array), which consumes less than 15% of hardware resources. ORNIC can achieve 95 Gbps RDMA throughput, which is nearly 2.5 times that of MP-RDMA. When handling OOO packets, ORNIC’s performance is virtually unaffected, while the performance of Xilinx ERNIC and Mellanox CX-5 drops below 1 Gbps. Moreover, compared with MELO and LEFT, our bitmap has higher performance and lower bitmap block usage.

  • Open Access Icon
  • Research Article
  • 10.3390/electronics14010080
Multiple Kernel Transfer Learning for Enhancing Network Intrusion Detection in Encrypted and Heterogeneous Network Environments
  • Dec 27, 2024
  • Electronics
  • Abdelfattah Amamra + 1 more

Conventional supervised machine learning is widely used for intrusion detection without packet payload inspection, showing good accuracy in detecting known attacks. However, these methods require large labeled datasets, which are scarce due to privacy concerns, and struggle with generalizing to real-world traffic and adapting to domain shifts. Additionally, they are ineffective against zero-day attacks and need frequent retraining, making them difficult to maintain in dynamic network environments. To overcome the limitations of traditional machine learning methods, we propose novel Deterministic (DetMKTL) and Stochastic Multiple-Kernel Transfer Learning (StoMKTL) algorithms that are based on transfer learning. These algorithms leverage multiple kernel functions to capture complex, non-linear relationships in network traffic, enhancing adaptability and accuracy while reducing dependence on large labeled datasets. The proposed algorithms demonstrated good accuracy, particularly in cross-domain evaluations, achieving accuracy rates exceeding 90%. This highlights the robustness of the models in handling diverse network environments and varying data distributions. Moreover, our models exhibited superior performance in detecting multiple types of cyber attacks, including zero-day threats. Specifically, the detection rates reached up to 87% for known attacks and approximately 75% for unseen attacks or their variants. This emphasizes the ability of our algorithms to generalize well to novel and evolving threat scenarios, which are often overlooked by traditional systems. Additionally, the proposed algorithms performed effectively in encrypted traffic analysis, achieving an accuracy of 86%. This result demonstrates the possibility of our models to identify malicious activities within encrypted communications without compromising data privacy.

  • Research Article
  • Cite Count Icon 2
  • 10.3233/idt-240319
CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method
  • Sep 16, 2024
  • Intelligent Decision Technologies
  • Hamed Danesh + 2 more

Crypto-jacking attack is a novel type of cyber-attack on the internet that has emerged because of the popularity of digital currencies. These attacks are the most common type of attacks in the cryptocurrency field because of their specific features such as easy scenario, un-traceability, and ease of secrecy. In crypto-jacking attacks, it is common to embed malicious code inside website scripts. Different techniques have been provided to deal with Crypto-jacking attacks, but crypto-jacking attackers bypass them by limiting resources. The crypto-mining services provided on the internet are legal, and due to the anonymous nature of cryptocurrencies, client identification is a challenging task. Improving the accuracy and performance of the Crypto-jacking attack detection methods are the main objectives of this study. In this paper, a hybrid network-based method to identify these attacks to achieve better and more accurate results. The proposed solution (CMShark) is a combination of machine learning (ML) models, IP blacklisting and payload inspection methods. In the ML model, the packets are classified using size patterns; in IP blacklisting, attacks are detected based on known infected addresses and infected scripts. In payload inspection, the provided information on the packet payload is searched for any suspicious keywords. The proposed method relies solely on the network and is deployed on the edge of the network, making it infrastructureindependent. The proposed detection model reaches an accuracy score of 97.02%, an F1-score of 96.90% a ROC AUC score of 97.20% in input NetFlow classification; and a 93.98% accuracy score, 94.30% F1-score and 97.30% ROC AUC score in output NetFlow classification.

  • Research Article
  • Cite Count Icon 4
  • 10.1016/j.comnet.2024.110746
Multi-view multi-label network traffic classification based on MLP-Mixer neural network
  • Aug 24, 2024
  • Computer Networks
  • Yu Zheng + 4 more

Multi-view multi-label network traffic classification based on MLP-Mixer neural network

  • Research Article
  • Cite Count Icon 1
  • 10.1145/3676861
FAJITA: Stateful Packet Processing at 100 Million pps
  • Aug 18, 2024
  • Proceedings of the ACM on Networking
  • Hamid Ghasemirahni + 5 more

Data centers increasingly utilize commodity servers to deploy low-latency Network Functions (NFs). However, the emergence of multi-hundred-gigabit-per-second network interface cards (NICs) has drastically increased the performance expected from commodity servers. Additionally, recently introduced systems that store packet payloads in temporary off-CPU locations (e.g., programmable switches, NICs, and RDMA servers) further increase the load on NF servers, making packet processing even more challenging. This paper demonstrates existing bottlenecks and challenges of state-of-the-art stateful packet processing frameworks and proposes a system, called FAJITA, to tackle these challenges & accelerate stateful packet processing on commodity hardware. FAJITA proposes an optimized processing pipeline for stateful network functions to minimize memory accesses and overcome the overheads of accessing shared data structures while ensuring efficient batch processing at every stage of the pipeline. Furthermore, FAJITA provides a performant architecture to deploy high-performance network functions service chains containing stateful elements with different state granularities. FAJITA improves the throughput and latency of high-speed stateful network functions by ~2.43x compared to the most performant state-of-the-art solutions, enabling commodity hardware to process up to ~178 Million 64-B packets per second (pps) using 16 cores.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 1
  • 10.3390/rs16152718
SSH-MAC: Service-Aware and Scheduling-Based Media Access Control Protocol in Underwater Acoustic Sensor Network
  • Jul 24, 2024
  • Remote Sensing
  • Hongyu Zhao + 2 more

In the framework of the space-air-ground-ocean integrated network, the underwater acoustic sensor network (UASN) plays a pivotal role. The design of media access control (MAC) protocols is essential for the UASN to ensure efficient and reliable data transmission. From the perspective of differentiated services in the UASN, a service-aware and scheduling-based hybrid MAC protocol, named the SSH-MAC protocol, is proposed in this paper. In the SSH-MAC protocol, the centralized scheduling strategy is adopted by sensor nodes with environmental monitoring service, and the distributed scheduling strategy is adopted by sensor nodes with target detection service. Considering the time-varying data generation rate of sensor nodes, the sink node will switch the scheduling mode of sensor nodes based on the specific control packet and adjust the resource allocation ratio between centralized scheduling and distributed scheduling. Simulation results show that the performance of the SSH-MAC protocol, in terms of utilization, end-to-end delay, packet delivery ratio, energy consumption, and payload efficiency, is good.

  • Open Access Icon
  • Research Article
  • 10.1155/2024/8725832
HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection
  • May 30, 2024
  • Security and Communication Networks
  • Peng Xiao + 3 more

Malicious encrypted traffic detection is a critical component of network security management. Previous detection methods can be categorized into two classes as follows: one is to use the feature engineering method to construct traffic features for classification and the other is to use the end-to-end method that directly inputs the original traffic to obtain traffic features for classification. Both of the abovementioned two methods have the problem that the obtained features cannot fully characterize the traffic. To this end, this paper proposes a hierarchical multimodal deep learning model (HMMED) for malicious encrypted traffic detection. This model adopts the abovementioned two feature generation methods to learn the features of payload and header, respectively, then fuses the features to get the final traffic features, and finally inputs the final traffic features into the softmax classifier for classification. In addition, since traditional deep learning is highly dependent on the training set size and data distribution, resulting in a model that is not very generalizable and difficult to adapt to unseen encrypted traffic, the model proposed in this paper uses a large amount of unlabeled encrypted traffic in the pretraining layer to pretrain a submodel used to obtain a generic packet payload representation. The test results on the USTC-TFC2016 dataset show that the proposed model can effectively solve the problem of insufficient feature extraction of traditional detection methods and improve the ACC of malicious encrypted traffic detection.

  • Research Article
  • Cite Count Icon 7
  • 10.1016/j.comnet.2024.110372
DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification
  • Mar 27, 2024
  • Computer Networks
  • Xinbo Han + 6 more

DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • 10.3390/electronics13050930
Traffic Fingerprints for Homogeneous IoT Traffic Based on Packet Payload Transition Patterns
  • Feb 29, 2024
  • Electronics
  • Mingrui Fan + 4 more

Traffic fingerprint was considered an effective security protection mechanism in IoT scenarios because it can be used to automatically identify accessed devices. However, the results of replication experiments show that the classic traffic fingerprints based on simple network traffic attribute features have a significantly lower ability to identify accessed devices in real 5G IoT scenarios compared to what was stated in traditional IoT scenarios. The growing homogenization of IoT traffic caused by the application of 5G is believed to be the reason for the poor ability of traditional traffic fingerprints to identify 5G IoT terminals. Studying an enhanced traffic fingerprint is necessary to accommodate the homogeneous Internet of Things traffic. In addition, during the reproducing experiments, we noticed that the solution of overlap is a key factor that restricts the recognition ability of one-vs-all multi-classifiers, and the efficiency of existing methods still has some room for optimization. Based on targeted improvements to these two issues, we proposed an enhanced IoT terminal traffic fingerprint based on packet payload transition patterns to improve the device recognition ability in homogeneous IoT traffic. Additionally, we designed an improved solution for overlap based on density centers to expedite decision making. According to the experimental results, when compared with the existing traffic fingerprint, the proposed traffic fingerprint in this study demonstrated a Macro-Average Precision of close to 90% for network traffic from real 5G IoT terminals. The proposed overlap solution based on the density centers reduced the decision-making time from hundreds of seconds to tens of seconds while ensuring decision-making accuracy.

  • Open Access Icon
  • Research Article
  • 10.11591/ijece.v14i1.pp488-496
An innovative approach for enhancing capacity utilization in point-to-point voice over internet protocol calls
  • Feb 1, 2024
  • International Journal of Electrical and Computer Engineering (IJECE)
  • Mosleh M Abualhaj + 4 more

Voice over internet protocol (VoIP) calls are increasingly transported over computer-based networking due to several factors, such as low call rates. However, point-to-point (P-P) calls, as a division of VoIP, are encountering a capacity utilization issue. The main reason for that is the giant packet header, especially when compared to the runt P-P calls packet payload. Therefore, this research article introduced a method to solve the liability of the giant packet header of the P-P calls. The introduced method is named voice segment compaction (VSC). The VSC method employs the unneeded P-P calls packet header elements to carry the voice packet payload. This, in turn, reduces the size of the voice payload and improves network capacity utilization. The preliminary results demonstrated the importance of the introduced VSC method, while network capacity improved by up to 38.33%.

  • Research Article
  • Cite Count Icon 1
  • 10.2478/ttj-2024-0005
MVF: A Novel Technique to Reduce the Voip Packet Payload Length
  • Feb 1, 2024
  • Transport and Telecommunication Journal
  • Mosleh M Abualhaj + 3 more

Abstract The adoption of the Voice over Internet Protocol (VoIP) system is growing due to several factors, including its meagre rate and the numerous contours that can be joined with VoIP systems. However, the wasteful utilisation of the computer network is an inevitable problem that limits the rapid growth of VoIP systems. The essential explanation behind this wasteful utilisation of the computer network bandwidth (BW) is the considerable preamble length of the VoIP packet. In this study, we invent a technique that addresses the considerable preamble length of the VoIP packet. The designed technique is known as the manikin voice frame (MVF). The primary idea of the MVF technique is to utilise the VoIP packet preamble tuples that are not essential to the voice calls, particularly client-to-client calls (voice calls between only two users). Specifically, these tuples will be utilised for reserving the data of the VoIP packet. In certain instances, this will make the VoIP packet data manikin or even make it empty. The performance assessment of the introduced MVF technique demonstrated that the utilisation of the computer network BW has enhanced by 33%. Along these lines, the MVF technique indicates potential progress in resolving the inefficient usage of the computer network BW.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 5
  • 10.3390/en17020485
Towards Energy Efficient Wireless Sensing by Leveraging Ambient Wi-Fi Traffic
  • Jan 19, 2024
  • Energies
  • Aryan Sharma + 4 more

Wireless-based sensing of physical environments has garnered tremendous attention recently, and its applications range from intruder detection to environmental occupancy monitoring. Wi-Fi is positioned as a particularly advantageous sensing medium, due to the ubiquity of Wi-Fi-enabled devices in a more connected world. Although Wi-Fi-based sensing using Channel State Information (CSI) has shown promise, existing sensing systems commonly configure dedicated transmitters to generate packets for sensing. These dedicated transmitters substantially increase the energy requirements of Wi-Fi sensing systems, and hence there is a need for understanding how ambient transmissions from nearby Wi-Fi devices can be leveraged instead. This paper explores the potential of Wi-Fi-based sensing using CSI derived from ambient transmissions of Wi-Fi devices. We demonstrate that CSI sensing accuracy is dependent on the underlying traffic type and the Wi-Fi transceiver architecture, and that control packets yield more robust CSI than payload packets. We also show that traffic containing upload data is more suitable for human occupancy counting, using the Probability Mass Function (PMF) of CSI. We further demonstrate that multiple spatially diverse streams of Wi-Fi CSI can be combined for sensing to an accuracy of 99%. The experimental study highlights the importance of training Wi-Fi sensing systems for multiple transmission sources to improve accuracy. This research has significant implications for the development of energy-efficient Wi-Fi sensing solutions for a range of applications.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 11
  • 10.1016/j.comnet.2023.110162
Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection
  • Dec 22, 2023
  • Computer Networks
  • Roberto Doriguzzi-Corin + 4 more

Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.11591/eei.v12i6.6117
Tel-MPLS: a new method for maximizing the utilization of IP telephony over MPLS networks
  • Dec 1, 2023
  • Bulletin of Electrical Engineering and Informatics
  • Mosleh M Abualhaj + 4 more

Currently, the multiprotocol label switching (MPLS) standard is extremely prevalent. By exploiting the features provided by MPLS technology, a range of services, including IP telephony, have enhanced their overall performance. However, due to the size of the packet header, the IP telephony service consumes a significant portion of the MPLS network's available bandwidth. For instance, in IP telephony over MPLS networks, the packet header might account for as much as 80% of lost time and bandwidth. Designers working on IP telephony are making substantial efforts to address this issue. This study contributes to current efforts by proposing a novel approach called Tel-MPLS, which involves IP telephony over MPLS. TelMPLS approach uses the superfluous fields in the IP telephony packet's header to retain the packet data, therefore lowering or zeroing the IP telephony packet's payload. Tel-MPLS is an approach that significantly reduces the bandwidth of IP telephony MPLS networks. According to the findings, the Tel-MPLS approach is capable of reducing the amount of bandwidth that is lost by 12% when using the G.729 codec.

  • Research Article
  • Cite Count Icon 4
  • 10.1016/j.cose.2023.103628
Remote access trojan traffic early detection method based on Markov matrices and deep learning
  • Nov 30, 2023
  • Computers & Security
  • Ben Pi + 5 more

Remote access trojan traffic early detection method based on Markov matrices and deep learning

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.1145/3617181
A Self-adaptive and Secure Approach to Share Network Trace Data
  • Oct 20, 2023
  • Digital Threats: Research and Practice
  • Antonios Xenakis + 5 more

A large volume of network trace data are collected by the government and public and private organizations and can be analyzed for various purposes such as resolving network problems, improving network performance, and understanding user behavior. However, most organizations are reluctant to share their data with any external experts for analysis, because they contain sensitive information deemed proprietary to the organization, thus raising privacy concerns. Even if the payload of network packets is not shared, header data may disclose sensitive information that adversaries can exploit to perform unauthorized actions. So network trace data need to be anonymized before being shared. Most of the existing anonymization tools have two major shortcomings: (1) they cannot provide provable protection, and (2) their performance relies on setting the right parameter values such as the degree of privacy protection and the features that should be anonymized, but there is little assistance for a user to optimally set these parameters. This article proposes a self-adaptive and secure approach to anonymize network trace data and provides provable protection and automatic optimal settings of parameters. A comparison of the proposed approach with existing anonymization tools via experimentation demonstrated that the proposed method outperforms the existing anonymization techniques.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 4
  • 10.3390/electronics12204253
An Ensemble of Text Convolutional Neural Networks and Multi-Head Attention Layers for Classifying Threats in Network Packets
  • Oct 14, 2023
  • Electronics
  • Hyeonmin Kim + 1 more

Using traditional methods based on detection rules written by human security experts presents significant challenges for the accurate detection of network threats, which are becoming increasingly sophisticated. In order to deal with the limitations of traditional methods, network threat detection techniques utilizing artificial intelligence technologies such as machine learning are being extensively studied. Research has also been conducted on analyzing various string patterns in network packet payloads through natural language processing techniques to detect attack intent. However, due to the nature of packet payloads that contain binary and text data, a new approach is needed that goes beyond typical natural language processing techniques. In this paper, we study a token extraction method optimized for payloads using n-gram and byte-pair encoding techniques. Furthermore, we generate embedding vectors that can understand the context of the packet payload using algorithms such as Word2Vec and FastText. We also compute the embedding of various header data associated with packets such as IP addresses and ports. Given these features, we combine a text 1D CNN and a multi-head attention network in a novel fashion. We validated the effectiveness of our classification technique on the CICIDS2017 open dataset and over half a million data collected by The Education Cyber Security Center (ECSC), currently operating in South Korea. The proposed model showed remarkable performance compared to previous studies, achieving highly accurate classification with an F1-score of 0.998. Our model can also preprocess and classify 150,000 network threats per minute, helping security agents in the field maximize their time and analyze more complex attack patterns.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 4
  • 10.3390/app13148104
Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU
  • Jul 11, 2023
  • Applied Sciences
  • Merve Çelebi + 1 more

Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze packet contents in applications that require control over payloads, such as content filtering, intrusion detection systems (IDSs), data loss prevention systems (DLPs), and fraud detection. This technology, known as deep packet inspection (DPI), provides full control over the communication between two end stations by keenly analyzing the network traffic. This study proposes a multi-pattern-matching algorithm that reduces the memory space and time required in the DPI pattern matching compared to traditional automaton-based algorithms with its ability to process more than one packet payload character at once. The pattern-matching process in the DPI system created to evaluate the performance of the proposed algorithm (PA) is conducted on the graphics processing unit (GPU), which accelerates the processing of network packets with its parallel computing capability. This study compares the PA with the Aho-Corasick (AC) and Wu–Manber (WM) algorithms, which are widely used in the pattern-matching process, considering the memory space required and throughput obtained. Algorithm tables created with a dataset containing 500 patterns use 425 and 688 times less memory space than those of the AC and WM algorithms, respectively. In the pattern-matching process using these tables, the PA is 3.5 and 1.5 times more efficient than the AC and WM algorithms, respectively.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers