A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
暂无分享,去创建一个
[1] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..
[2] Ali A. Ghorbani,et al. An Entropy Based Encrypted Traffic Classifier , 2015, ICICS.
[3] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[4] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[5] Pan Wang,et al. A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[6] T. Schurmann,et al. Bias Analysis in Entropy Estimation , 2004, cond-mat/0403192.
[7] Fakhri Karray,et al. Machine Learning-Based Classification of Encrypted Internet Traffic , 2012, MLDM.
[8] Ueli Maurer,et al. A universal statistical test for random bit generators , 1990, Journal of Cryptology.
[9] Antonio Pescapè,et al. Traffic identification engine: an open platform for traffic classification , 2014, IEEE Network.
[10] Jie Wu,et al. Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms , 2016, IEEE Transactions on Vehicular Technology.
[11] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[12] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[13] Pan Wang,et al. Smart devices information extraction in home Wi-Fi networks , 2018, Internet Technol. Lett..
[14] Myung-Sup Kim,et al. A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[15] Mohsen Guizani,et al. A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.
[16] Meng Zhang,et al. Encrypted Traffic Classification Based on an Improved Clustering Algorithm , 2012, ISCTCS.
[17] Peter Dorfinger,et al. Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper) , 2011, TMA.
[18] Dongsheng Wang,et al. An Novel Hybrid Method for Effectively Classifying Encrypted Traffic , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[19] Saad Usman Khan,et al. Identification of malicious behavior patterns for software , 2014 .
[20] Jean Goubault-Larrecq,et al. On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case , 2013, FPS.
[21] G Ramesh,et al. Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones , 2018 .
[22] Shingo Ata,et al. Towards real-time processing for application identification of encrypted traffic , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[23] Zhixin Sun,et al. A Smart Automated Signature Extraction Scheme for Mobile Phone Number in Human-Centered Smart Home Systems , 2018, IEEE Access.
[24] Toshinobu Kaneko,et al. Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[25] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[26] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[27] A. Rukhin,et al. Statistical Testing of Random Number Generators , 1999 .
[28] Xiaojiang Du,et al. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[29] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[30] Yuhuan Zhou,et al. Encrypted Traffic Identification Based on Sparse Logistical Regression and Extreme Learning Machine , 2015 .
[31] Andrzej Duda,et al. Markov chain fingerprinting to classify encrypted traffic , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[32] Zigang Cao,et al. A Survey on Encrypted Traffic Classification , 2014 .
[33] Thomas Schürmann. Bias analysis in entropy estimation , 2004 .
[34] Pierre L'Ecuyer,et al. TestU01: A C library for empirical testing of random number generators , 2006, TOMS.
[35] Riyad Alshammari,et al. Machine learning based encrypted traffic classification: Identifying SSH and Skype , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[36] Kensuke Fukuda,et al. Detecting Malicious Activity With DNS Backscatter Over Time , 2017, IEEE/ACM Transactions on Networking.