Abstract: The rapid increase in encrypted network traffic has made detecting malicious activities a critical challenge in network management, attracting significant research attention. However, most ...