Abstract: In an increasingly complex network environment, accurately and effectively identifying abnormal network traffic has become a key challenge in ensuring network security. Traditional manual ...