Towards real-time processing for application identification of encrypted traffic
暂无分享,去创建一个
Shingo Ata | Ikuo Oka | Yoshihiro Nakahira | Nobuyuki Nakamura | Yuichi Kumano | S. Ata | I. Oka | Y. Nakahira | Yuichi Kumano | N. Nakamura
[1] Ming Zhang,et al. Detecting traffic differentiation in backbone ISPs with NetPolice , 2009, IMC '09.
[2] Aditya Akella,et al. Demystifying configuration challenges and trade-offs in network-based ISP services , 2011, SIGCOMM.
[3] Shingo Ata,et al. Application identification from encrypted traffic based on characteristic changes by encryption , 2011, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
[4] Shingo Ata,et al. Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.
[5] A. Nur Zincir-Heywood,et al. A Comparison of three machine learning techniques for encrypted network traffic analysis , 2011, 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[6] Riyad Alshammari,et al. Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? , 2011, Comput. Networks.