Network traffic classification for data fusion: A survey
暂无分享,去创建一个
Witold Pedrycz | Xuyang Jing | Zheng Yan | Jingjing Zhao | W. Pedrycz | Zheng Yan | Xuyang Jing | Jingjing Zhao
[1] Witold Pedrycz,et al. A Group-Based Distance Learning Method for Semisupervised Fuzzy Clustering , 2020, IEEE Transactions on Cybernetics.
[2] Q. Zheng,et al. Knowledge forest: a novel model to organize knowledge fragments , 2019, Science China Information Sciences.
[3] Gunnard Engebreth. Bug Fixes , 2021, PHP 8 Revealed.
[4] Vladimir A. Muliukha,et al. Analysis and Classification of Encrypted Network Traffic Using Machine Learning , 2020, 2020 XXIII International Conference on Soft Computing and Measurements (SCM).
[5] Witold Pedrycz,et al. A survey on machine learning for data fusion , 2020, Inf. Fusion.
[6] Raimo Kantola,et al. An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks , 2020, J. Netw. Comput. Appl..
[7] David Choffnes,et al. FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic , 2020, NDSS.
[8] Pratibha Khandait,et al. Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification , 2020, 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS).
[9] Yu Zhang,et al. STNN: A Novel TLS/SSL Encrypted Traffic Classification System Based on Stereo Transform Neural Network , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).
[10] Jun Zhang,et al. Noise-Resistant Statistical Traffic Classification , 2019, IEEE Transactions on Big Data.
[11] Laurence T. Yang,et al. A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.
[12] Witold Pedrycz,et al. Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch , 2019, Inf. Fusion.
[13] Witold Pedrycz,et al. A reversible sketch-based method for detecting and mitigating amplification attacks , 2019, J. Netw. Comput. Appl..
[14] Wei Su,et al. Real-Time Classification Method of Network Traffic Based on Parallelized CNN , 2019, 2019 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS).
[15] Hyuk Lim,et al. Bayesian Neural Network Based Encrypted Traffic Classification using Initial Handshake Packets , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S).
[16] Muhammad Ejaz Ahmed,et al. Statistical Application Fingerprinting for DDoS Attack Mitigation , 2019, IEEE Transactions on Information Forensics and Security.
[17] Pedro Casas,et al. Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge , 2019, 2019 IEEE Security and Privacy Workshops (SPW).
[18] Md. Foysal Hossain,et al. Encrypted Traffic Classification Based ML for Identifying Different Social Media Applications , 2019, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE).
[19] Raj Jain,et al. Flow online identification method for the encrypted Skype , 2019, J. Netw. Comput. Appl..
[20] Masanori Miyazawa,et al. Framework and Implementation of Online Smartphone Traffic Classification According to Quality Sensitivity , 2019, 2019 IEEE ComSoc International Communications Quality and Reliability Workshop (CQR).
[21] Mohammed Atiquzzaman,et al. Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.
[22] Zheng Yan,et al. Adaptive security-related data collection with context awareness , 2019, J. Netw. Comput. Appl..
[23] Otto Carlos Muniz Bandeira Duarte,et al. A fast unsupervised preprocessing method for network monitoring , 2018, Annals of Telecommunications.
[24] Cedric Baudoin,et al. Towards the Deployment of Machine Learning Solutions in Network Traffic Classification: A Systematic Survey , 2019, IEEE Communications Surveys & Tutorials.
[25] Witold Pedrycz,et al. Security Data Collection and Data Analytics in the Internet: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[26] Zhen Liu,et al. Extending labeled mobile network traffic data by three levels traffic identification fusion , 2018, Future Gener. Comput. Syst..
[27] Zheng Yan,et al. A survey on network data collection , 2018, J. Netw. Comput. Appl..
[28] Feng Xiao,et al. Network traffic classification based on transfer learning , 2018, Comput. Electr. Eng..
[29] Jakub Lokoc,et al. Learning communication patterns for malware discovery in HTTPs data , 2018, Expert Syst. Appl..
[30] Jinghua Yan,et al. A Survey of Traffic Classification Validation and Ground Truth Collection , 2018, 2018 8th International Conference on Electronics Information and Emergency Communication (ICEIEC).
[31] Otto Carlos Muniz Bandeira Duarte,et al. An Adaptive Real-Time Architecture for Zero-Day Threat Detection , 2018, 2018 IEEE International Conference on Communications (ICC).
[32] Omer Gurewitz,et al. Traffic Classification Based on Zero-Length Packets , 2018, IEEE Transactions on Network and Service Management.
[33] Zheng Yan,et al. A Survey on Network Security-Related Data Collection Technologies , 2018, IEEE Access.
[34] Witold Pedrycz,et al. Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey , 2018, J. Netw. Comput. Appl..
[35] Guanglu Sun,et al. Internet Traffic Classification Based on Incremental Support Vector Machines , 2018, Mob. Networks Appl..
[36] Antonio Pescapè,et al. Multi-classification approaches for classifying mobile app traffic , 2018, J. Netw. Comput. Appl..
[37] Neminath Hubballi,et al. RDClass: on using relative distance of keywords for accurate network traffic classification , 2018, IET Networks.
[38] Hassan Nazeer Chaudhry,et al. A machine learning approach for feature selection traffic classification using security analysis , 2018, The Journal of Supercomputing.
[39] Mohammed Atiquzzaman,et al. LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey , 2018, IEEE Access.
[40] Ali Fanian,et al. Encrypted Traffic Classification Using Statistical Features , 2018 .
[41] Narseo Vallina-Rodriguez,et al. Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions , 2018, NDSS.
[42] Tao Qin,et al. Internet traffic classification based on expanding vector of flow , 2017, Comput. Networks.
[43] Dongming Yuan,et al. A self-adaptive network traffic classification system with unknown flow detection , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[44] Viktor K. Prasanna,et al. Accelerating Decision Tree Based Traffic Classification on FPGA and Multicore Platforms , 2017, IEEE Transactions on Parallel and Distributed Systems.
[45] Otto Carlos Muniz Bandeira Duarte,et al. Collecting and characterizing a real broadband access network traffic dataset , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[46] Blake Anderson,et al. Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity , 2017, KDD.
[47] Wei Wu,et al. Efficient and robust feature extraction and selection for traffic classification , 2017, Comput. Networks.
[48] Jiong Jin,et al. Novel feature selection and classification of Internet video traffic based on a hierarchical scheme , 2017, Comput. Networks.
[49] Ciprian Dobre,et al. Internet traffic classification based on flows' statistical properties with machine learning , 2017, Int. J. Netw. Manag..
[50] Jie Cao,et al. An accurate traffic classification model based on support vector machines , 2017, Int. J. Netw. Manag..
[51] Nabin Kumar Karn,et al. Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[52] Siu-Ming Yiu,et al. A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms , 2016, IEEE Communications Surveys & Tutorials.
[53] Bogdan V. Ghita,et al. On Internet Traffic Classification: A Two-Phased Machine Learning Approach , 2016, J. Comput. Networks Commun..
[54] Mauro Conti,et al. AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[55] Arnaud Legout,et al. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic , 2015, MobiSys.
[56] Nino Vincenzo Verde,et al. Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.
[57] Shikha Agrawal,et al. A Survey on Feature Selection Techniques for Internet Traffic Classification , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).
[58] Dinil Mon Divakaran,et al. SLIC: Self-Learning Intelligent Classifier for network traffic , 2015, Comput. Networks.
[59] Yu-ning Dong,et al. Fine grained classification of Internet video traffics , 2015, 2015 21st Asia-Pacific Conference on Communications (APCC).
[60] Jie Wu,et al. Robust Network Traffic Classification , 2015, IEEE/ACM Transactions on Networking.
[61] Peng Hao,et al. Transfer learning using computational intelligence: A survey , 2015, Knowl. Based Syst..
[62] Paulo Salvador,et al. Do we need a perfect ground-truth for benchmarking Internet traffic classifiers? , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[63] Dan Meng,et al. An empirical study of morphing on behavior-based network traffic classification , 2015, Secur. Commun. Networks.
[64] Riyad Alshammari,et al. Identification of VoIP encrypted traffic using a machine learning approach , 2015, J. King Saud Univ. Comput. Inf. Sci..
[65] Shafi Goldwasser,et al. Machine Learning Classification over Encrypted Data , 2015, NDSS.
[66] Zigang Cao,et al. A Survey on Encrypted Traffic Classification , 2014 .
[67] Jun Zhang,et al. Internet Traffic Classification Using Constrained Clustering , 2014, IEEE Transactions on Parallel and Distributed Systems.
[68] Yanick Fratantonio,et al. ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).
[69] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[70] Zahir Tari,et al. An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion , 2014, Future Gener. Comput. Syst..
[71] Qinghua Zheng,et al. Omni-word Feature and Soft Constraint for Chinese Relation Extraction , 2014, ACL.
[72] Daniel Hernández-Lobato,et al. A Double Pruning Scheme for Boosting Ensembles , 2014, IEEE Transactions on Cybernetics.
[73] Eduardo Rocha,et al. A Survey of Payload-Based Traffic Classification Approaches , 2014, IEEE Communications Surveys & Tutorials.
[74] Myung-Sup Kim,et al. Integrated Internet Application-level Traffic Classification , 2014, KSII Trans. Internet Inf. Syst..
[75] Jun Zhang,et al. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions , 2023, IEEE Transactions on Information Forensics and Security.
[76] Arian Bär,et al. IP mining: Extracting knowledge from the dynamics of the Internet addressing space , 2013, Proceedings of the 2013 25th International Teletraffic Congress (ITC).
[77] Jun Zhang,et al. Unsupervised traffic classification using flow statistical properties and IP packet payload , 2013, J. Comput. Syst. Sci..
[78] Jun Zhang,et al. Network traffic clustering using Random Forest proximities , 2013, 2013 IEEE International Conference on Communications (ICC).
[79] Manuela Pereira,et al. Detection and classification of peer-to-peer traffic: A survey , 2013, CSUR.
[80] Zahir Tari,et al. Toward an efficient and scalable feature selection approach for internet traffic classification , 2013, Comput. Networks.
[81] Nen-Fu Huang,et al. Application traffic classification at the early stage by characterizing application rounds , 2013, Inf. Sci..
[82] Elena Baralis,et al. Self-learning classifier for Internet traffic , 2013, 2013 Proceedings IEEE INFOCOM.
[83] Jun Zhang,et al. An Effective Network Traffic Classification Method with Unknown Flow Detection , 2013, IEEE Transactions on Network and Service Management.
[84] Dario Rossi,et al. Reviewing Traffic Classification , 2013, Data Traffic Monitoring and Analysis.
[85] Jun Zhang,et al. Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.
[86] Dong Zhou,et al. Translation techniques in cross-language information retrieval , 2012, CSUR.
[87] Sebastian Zander,et al. Sub-flow packet sampling for scalable ML classification of interactive traffic , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[88] Ian Goldberg,et al. Enhancing Tor's performance using real-time traffic classification , 2012, CCS.
[89] Elena Baralis,et al. Hierarchical learning for fine grained internet traffic classification , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[90] Xenofontas A. Dimitropoulos,et al. Classifying internet one-way traffic , 2012, Internet Measurement Conference.
[91] Sunil Agrawal,et al. Machine Learning Classifier for Internet Traffic from Academic Perspective , 2012 .
[92] Jun Zhang,et al. A novel semi-supervised approach for network traffic clustering , 2011, 2011 5th International Conference on Network and System Security.
[93] Shunzheng Yu,et al. Internet Traffic Classification Using Machine Learning: A Token-based Approach , 2011, 2011 14th IEEE International Conference on Computational Science and Engineering.
[94] Stuart Cheshire,et al. Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry , 2011, RFC.
[95] James Won-Ki Hong,et al. Toward fine-grained traffic classification , 2011, IEEE Communications Magazine.
[96] Dario Rossi,et al. Experiences of Internet traffic monitoring with tstat , 2011, IEEE Network.
[97] Antonio Pescapè,et al. Early Classification of Network Traffic through Multi-classification , 2011, TMA.
[98] Donald Eastlake rd,et al. Transport Layer Security (TLS) Extensions: Extension Definitions , 2011 .
[99] Donald E. Eastlake,et al. Transport Layer Security (TLS) Extensions: Extension Definitions , 2011, RFC.
[100] Yanghee Choi,et al. Internet traffic classification demystified: on the sources of the discriminative power , 2010, CoNEXT.
[101] Dario Rossi,et al. KISS: Stochastic Packet Inspection Classifier for UDP Traffic , 2010, IEEE/ACM Transactions on Networking.
[102] Luka Cehovin,et al. Empirical evaluation of feature selection methods in classification , 2010, Intell. Data Anal..
[103] Shunzheng Yu,et al. Automatic Application Signature Construction from Unknown Traffic , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[104] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[105] Marco Canini,et al. Experience with high-speed automated application-identification for network-management , 2009, ANCS '09.
[106] Yuan-Cheng Lai,et al. Application classification using packet size distribution and port association , 2009, J. Netw. Comput. Appl..
[107] Judith Kelner,et al. A Survey on Internet Traffic Identification , 2009, IEEE Communications Surveys & Tutorials.
[108] Marco Canini,et al. GTVS: Boosting the Collection of Application Traffic Ground Truth , 2009, TMA.
[109] George Varghese,et al. Graph-Based P2P Traffic Classification at the Internet Backbone , 2009, IEEE INFOCOM Workshops 2009.
[110] Marco Canini,et al. Per flow packet sampling for high-speed network monitoring , 2009, 2009 First International Communication Systems and Networks and Workshops.
[111] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[112] Oliver W. W. Yang,et al. Contention avoidance and resolution schemes in bufferless all-optical packet-switched networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[113] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[114] István Szabó,et al. On the Validation of Traffic Classification Algorithms , 2008, PAM.
[115] James Won-Ki Hong,et al. Towards automated application signature generation for traffic identification , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[116] Qiang Yang,et al. Boosting for transfer learning , 2007, ICML '07.
[117] Anirban Mahanti,et al. Byte me: a case for byte accuracy in traffic classification , 2007, MineNet '07.
[118] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[119] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[120] Subhash C. Bagui,et al. Combining Pattern Classifiers: Methods and Algorithms , 2005, Technometrics.
[121] Jason Lee,et al. A first look at modern enterprise traffic , 2005, IMC '05.
[122] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[123] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[124] Chao-Ton Su,et al. An Extended Chi2 Algorithm for Discretization of Real Value Attributes , 2005, IEEE Trans. Knowl. Data Eng..
[125] Eibe Frank,et al. Logistic Model Trees , 2003, Machine Learning.
[126] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[127] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[128] Jason Weston,et al. Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.
[129] Huan Liu,et al. Consistency-based search in feature selection , 2003, Artif. Intell..
[130] Huan Liu,et al. Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution , 2003, ICML.
[131] Foster J. Provost,et al. Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction , 2003, J. Artif. Intell. Res..
[132] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[133] João Gama,et al. Functional trees for classification , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[134] Pedro Larrañaga,et al. Feature Subset Selection by Bayesian network-based optimization , 2000, Artif. Intell..
[135] T. Ishioka. Extended K-means with an Efficient Estimation of the Number of Clusters , 2000, IDEAL.
[136] Michael S. Borella,et al. The effect of network delay and media on user perceptions of web resources , 2000, Behav. Inf. Technol..
[137] Lloyd A. Smith,et al. Feature Selection for Machine Learning: Comparing a Correlation-Based Filter Approach to the Wrapper , 1999, FLAIRS.
[138] Harold Joseph Highland,et al. The 17th NSCS abstructArtificial Intelligence and Intrusion Detection: Current and Future Directions : Jeremy Frank, University of California, Davis, CA , 1995 .
[139] Larry A. Rendell,et al. The Feature Selection Problem: Traditional Methods and a New Algorithm , 1992, AAAI.
[140] Franklin E White,et al. Data Fusion Lexicon , 1991 .