Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network
暂无分享,去创建一个
Yulei Wu | Jingguo Ge | Zhuang Zou | Hongbo Zheng | Chunjing Han | Zhongjiang Yao | Yulei Wu | Jingguo Ge | Chunjing Han | Zhongjiang Yao | Zhuang Zou | Hongbo Zheng
[1] Xiaoqing Zhou,et al. Early Stage Internet Traffic Identification Using Data Gravitation Based Classification , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[2] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[3] Geoffrey Zweig,et al. Recent advances in deep learning for speech research at Microsoft , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[4] A. Ng. Feature selection, L1 vs. L2 regularization, and rotational invariance , 2004, Twenty-first international conference on Machine learning - ICML '04.
[5] Dongsheng Wang,et al. An Novel Hybrid Method for Effectively Classifying Encrypted Traffic , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[6] Pavel Celeda,et al. A survey of methods for encrypted traffic classification and analysis , 2015, Int. J. Netw. Manag..
[7] Ali A. Ghorbani,et al. Characterization of Tor Traffic using Time based Features , 2017, ICISSP.
[8] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[9] Riyad Alshammari,et al. Identification of VoIP encrypted traffic using a machine learning approach , 2015, J. King Saud Univ. Comput. Inf. Sci..
[10] Geyong Min,et al. Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems , 2017, IEEE Transactions on Big Data.
[11] Robert C. Atkinson,et al. Machine Learning Approach for Detection of nonTor Traffic , 2017, ARES.
[12] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[13] Trevor Darrell,et al. Long-term recurrent convolutional networks for visual recognition and description , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[15] Ali A. Ghorbani,et al. Characterization of Encrypted and VPN Traffic using Time-related Features , 2016, ICISSP.
[16] Jason Weston,et al. A unified architecture for natural language processing: deep neural networks with multitask learning , 2008, ICML '08.
[17] M. Amaç Güvensan,et al. Application identification via network traffic classification , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[18] Ming Zhu,et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[19] Renata Teixeira,et al. Traffic classification on the fly , 2006, CCRV.
[20] Andrzej Duda,et al. Markov chain fingerprinting to classify encrypted traffic , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[21] Mahdi Jafari Siavoshani,et al. Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.
[22] Riyad Alshammari,et al. Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? , 2011, Comput. Networks.
[23] Marie-Helen Maras. Inside Darknet: the takedown of Silk Road , 2014 .
[24] Xingrui Yu,et al. Deep learning in remote sensing scene classification: a data augmentation enhanced convolutional neural network framework , 2017 .
[25] Antonio Pescapè,et al. Issues and future directions in traffic classification , 2012, IEEE Network.
[26] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.