FINDING · DETECTION

Explicitly disentangling packet headers (structured, low-entropy) from encrypted payloads (high-entropy, stochastic) into separate MoE branches yields consistent gains across six datasets: 86.85% F1 on 120-class TLS 1.3 traffic (CSTNET-TLS), 97.88% F1 on USTC-TFC2016 malware/benign flows, and 92.65% F1 on imbalanced IoT traffic (CIC-IoT2022), demonstrating that headers and payloads carry fundamentally different and independently exploitable discriminative signals.

From 2026-he-trafficmoe-heterogeneity-aware-mixtureTrafficMoE: Heterogeneity-aware Mixture of Experts for Encrypted Traffic Classification · §III-A, §IV-B, Tables II–III · 2026 · arXiv preprint

Implications

Tags

censors
generic
techniques
ml-classifierdpifully-encrypted-detect
defenses
randomization

Extracted by claude-sonnet-4-6 — review before relying.