A survey of methods for encrypted traffic classification and analysis
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …
a standard nowadays. This presents a challenge for traffic measurement, especially for …
The parrot is dead: Observing unobservable network communications
A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …
censors in non-democratic countries have increased their technical capabilities and can …
[PDF][PDF] 网络加密流量识别研究综述及展望
潘吴斌, 程光, 郭晓军, 黄顺翔 - 通信学报, 2016 - infocomm-journal.com
鉴于加密流量识别技术的重要性和已有相关研究工作, 首先根据流量分析需求的层次介绍了加密
流量识别的类型, 如协议, 应用和服务. 其次, 概述已有加密流量识别技术, 并从多个角度进行分析 …
流量识别的类型, 如协议, 应用和服务. 其次, 概述已有加密流量识别技术, 并从多个角度进行分析 …
A survey on encrypted traffic classification
Z Cao, G Xiong, Y Zhao, Z Li, L Guo - Applications and Techniques in …, 2014 - Springer
With the widespread use of encryption techniques in network applications, encrypted
network traffic has recently become a great challenge for network management. Studies on …
network traffic has recently become a great challenge for network management. Studies on …
VoIP traffic detection in tunneled and anonymous networks using deep learning
Network management is facing a great challenge to analyze and identify encrypted network
traffic with specific applications and protocols. A significant number of network users …
traffic with specific applications and protocols. A significant number of network users …
Flow context and host behavior based shadowsocks's traffic identification
X Zeng, X Chen, G Shao, T He, Z Han, Y Wen… - IEEE …, 2019 - ieeexplore.ieee.org
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of
anonymous proxy services, becoming an important part of many anonymous proxy …
anonymous proxy services, becoming an important part of many anonymous proxy …
Encrypted traffic classification based ml for identifying different social media applications
F Al-Obaidy, S Momtahen, MF Hossain… - 2019 IEEE Canadian …, 2019 - ieeexplore.ieee.org
Increasing the deployment of encryption in network protocols and applications poses a
challenge for traditional traffic classification approaches. Social media applications such as …
challenge for traditional traffic classification approaches. Social media applications such as …
[PDF][PDF] On different ways to classify Internet traffic: a short review of selected publications
P Foremski - Theoretical and Applied Informatics, 2013 - bibliotekanauki.pl
Traffic classification is an important tool for network management. It reveals the source of
observed network traffic and has many potential applications eg in Quality of Service …
observed network traffic and has many potential applications eg in Quality of Service …
Internet traffic classification using machine learning approach: Datasets validation issues
HAH Ibrahim, ORA Al Zuobi… - 2016 Conference of …, 2016 - ieeexplore.ieee.org
Internet traffic classification is an area of current research interest. The failure of port and
payload based classification motivates researchers to head towards a machine learning …
payload based classification motivates researchers to head towards a machine learning …
Measuring the accuracy of open-source payload-based traffic classifiers using popular internet applications
S Alcock, R Nelson - 38th Annual IEEE Conference on Local …, 2013 - ieeexplore.ieee.org
Open-source payload-based traffic classifiers are frequently used as a source of ground
truth in the traffic classification research field. However, there have been no comprehensive …
truth in the traffic classification research field. However, there have been no comprehensive …