[PDF][PDF] 基于特征串的应用层协议识别

陈亮, 龚俭, 徐选 - 2006 - jslab6.edu.cn
摘要随着各种P2P 协议的广泛应用以及逃避防火墙检测的需要, 传统的基于常用端口识别应用层
协议的方法已经出现问题. 文章通过分析可用的文档和实际报文TRACE, 分别为七种应用层协议 …

Internet application traffic classification using fixed IP-port

SH Yoon, JW Park, JS Park, YS Oh, MS Kim - Management Enabling the …, 2009 - Springer
As network traffic is dramatically increasing due to the popularization of Internet, the need for
application traffic classification becomes important for the effective use of network resources …

[HTML][HTML] Network traffic identification in packet sampling environment

S Dong, Y Xia - Digital communications and networks, 2023 - Elsevier
With the rapid growth of network bandwidth, traffic identification is currently an important
challenge for network management and security. In recent years, packet sampling has been …

Cognitive optical network testbed: EU project CHRON

R Borkowski, RJ Durán, C Kachris… - Journal of Optical …, 2015 - opg.optica.org
The aim of cognition in optical networks is to introduce intelligence into the control plane that
allows for autonomous end-to-end performance optimization and minimization of required …

Application traffic classification using payload size sequence signature

KS Shim, JH Ham, BD Sija… - International Journal of …, 2017 - Wiley Online Library
Recently, network traffic has become more complex and diverse because of the emergence
of new applications and services. Therefore, the importance of application‐level traffic …

Traffic identification method based on multiple probabilistic neural network model

S Dong, R Li - Neural Computing and Applications, 2019 - Springer
Traffic identification is currently an important challenge for network management and
security. In this paper, we propose a novel application identification method named as …

[PDF][PDF] 应用层协议识别算法综述

陈亮, 龚俭, 徐选 - 2007 - jslab6.edu.cn
摘要能够标识出Internet 上每个流所使用的应用层协议是一系列网络应用的前提和基础.
然而随着网络的高速化和协议的复杂化, 传统的基于端口识别应用层协议的算法已经不够准确 …

Network data collection and response system

SN Chari, PC Cheng, X Hu, L Koved, JR Rao… - US Patent …, 2017 - Google Patents
Embodiments include a network data collection and response system for enhancing security
in an enterprise network providing a user-supplied computing device with access to the …

Communication protocol classification based on LSTM and DBN

W Li, Z Dou, L Qi - IEEE Access, 2020 - ieeexplore.ieee.org
In the battlefield, we often don't know the parameters about enemy wireless communication
system. Therefore, we need to use electronic reconnaissance equipment to search …

A hybrid approach for accurate application traffic identification

YJ Won, BC Park, HT Ju, MS Kim… - 2006 4th IEEE/IFIP …, 2006 - ieeexplore.ieee.org
The traffic dynamics of the Internet's dominant applications, such as peer-to-peer and
multimedia, worsen the accuracy of the existing application traffic identification. There is a …