Progress in Study of Encrypted Traffic Classification
暂无分享,去创建一个
Li Guo | Gang Xiong | Zigang Cao | Shoufeng Cao | G. Xiong | Shoufeng Cao | Li Guo | Zigang Cao
[1] Fabian Monrose,et al. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Grenville J. Armitage,et al. Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[3] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[4] Sakir Sezer,et al. Host-Based P2P Flow Identification and Use in Real-Time , 2011, TWEB.
[5] Xiuqin Su,et al. The classification of SSH tunneled traffic using maximum likelihood classifier , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[6] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[7] Luca Salgarelli,et al. Optimizing statistical classifiers of network traffic , 2010, IWCMC.
[8] Malcolm I. Heywood,et al. Genetic optimization and hierarchical clustering applied to encrypted traffic identification , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[9] Luca Salgarelli,et al. Impact of Asymmetric Routing on Statistical Traffic Classification , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[10] Charles V. Wright,et al. Using visual motifs to classify encrypted traffic , 2006, VizSEC '06.
[11] Ian Goldberg,et al. SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.
[12] Riyad Alshammari,et al. Machine learning based encrypted traffic classification: Identifying SSH and Skype , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[13] Yuanchao Lu,et al. Correlation-Based Traffic Analysis on Encrypted VoIP Traffic , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[14] Erik Hjelmvik,et al. Breaking and Improving Protocol Obfuscation , 2010 .
[15] Maurizio Dusi,et al. Quantifying the accuracy of the ground truth associated with Internet traffic traces , 2011, Comput. Networks.
[16] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[17] Marco Canini,et al. GTVS: Boosting the Collection of Application Traffic Ground Truth , 2009, TMA.
[18] PJ Radcliffe,et al. VoIP traffic classification in IPSec tunnels , 2010, 2010 International Conference on Electronics and Information Engineering.