How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?
暂无分享,去创建一个
[1] George Varghese,et al. Graption: A graph-based P2P traffic classification framework for the internet backbone , 2011, Comput. Networks.
[2] Riyad Alshammari,et al. Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? , 2011, Comput. Networks.
[3] Jon Callas,et al. ZRTP: Media Path Key Agreement for Unicast Secure RTP , 2011, RFC.
[4] Judith Kelner,et al. Better network traffic identification through the independent combination of techniques , 2010, J. Netw. Comput. Appl..
[5] Luca Salgarelli,et al. Support Vector Machines for TCP traffic classification , 2009, Comput. Networks.
[6] Judith Kelner,et al. A Survey on Internet Traffic Identification , 2009, IEEE Communications Surveys & Tutorials.
[7] Riyad Alshammari,et al. Generalization of signatures for SSH encrypted traffic identification , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[8] John C. S. Lui,et al. Profiling and identification of P2P traffic , 2009, Comput. Networks.
[9] Parag Kulkarni,et al. A Survey of Semi-Supervised Learning Methods , 2008, 2008 International Conference on Computational Intelligence and Security.
[10] Riyad Alshammari,et al. Investigating Two Different Approaches for Encrypted Traffic Classification , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[11] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[12] Oliver W. W. Yang,et al. Contention avoidance and resolution schemes in bufferless all-optical packet-switched networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[13] Malcolm I. Heywood,et al. Managing team-based problem solving with symbiotic bid-based genetic programming , 2008, GECCO '08.
[14] Luca De Cicco,et al. Skype video responsiveness to bandwidth variations , 2008, NOSSDAV.
[15] Dario Rossi,et al. Tracking Down Skype Traffic , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[16] Ronaldo M. Salles,et al. Detecting Skype flows in Web traffic , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[17] Carey L. Williamson,et al. Offline/realtime traffic classification using semi-supervised learning , 2007, Perform. Evaluation.
[18] Riyad Alshammari,et al. A flow based approach for SSH traffic detection , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[19] Dario Rossi,et al. Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM '07.
[20] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[21] Edwin D. de Jong,et al. A Monotonic Archive for Pareto-Coevolution , 2007, Evolutionary Computation.
[22] C.-C. Jay Kuo,et al. GA-Based Internet Traffic Classification Technique for QoS Provisioning , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[23] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[24] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.
[25] Anirban Mahanti,et al. Traffic classification using clustering algorithms , 2006, MineNet '06.
[26] Carey L. Williamson,et al. A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.
[27] Jean-Marc Valin,et al. Improved Noise Weighting in CELP Coding of Speech - Applying the Vorbis Psychoacoustic Model To Speex , 2006, ArXiv.
[28] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[29] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[30] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[31] Konstantina Papagiannaki,et al. Toward the Accurate Identification of Network Applications , 2005, PAM.
[32] Henning Schulzrinne,et al. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[33] Charles V. Wright,et al. HMM profiles for network traffic classification , 2004, VizSEC/DMSEC '04.
[34] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[35] Catherine Rosenberg,et al. Behavioral authentication of server flows , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[36] Roger W. Johnson,et al. An Introduction to the Bootstrap , 2001 .
[37] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[38] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[39] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[40] Malcolm I. Heywood,et al. A Comparison of Unsupervised Learning Techniques for Encrypted Traffic Identification , 2009 .
[41] Djamel Sadok,et al. Performance evaluation of P2P VoIP applications , 2007 .
[42] R. Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[43] Sven Ehlert,et al. Analysis and Signature of Skype VoIP Session Traffic , 2006 .