|
[1]
|
Xiang, J., Fulton, N. and Chong, S. (2021) Relational Analysis of Sensor Attacks on Cyber-Physical Systems. 2021 IEEE 34th Computer Security Foundations Symposium (CSF), Dubrovnik, 21-25 June 2021, 1-16. [Google Scholar] [CrossRef]
|
|
[2]
|
Rezaei, S. and Liu, X. (2019) Deep Learning for Encrypted Traffic Classification: An Overview. IEEE Communications Magazine, 57, 76-81. [Google Scholar] [CrossRef]
|
|
[3]
|
Chen, L., Gao, S., Liu, B., Lu, Z. and Jiang, Z. (2020) THS-IDPC: A Three-Stage Hierarchical Sampling Method Based on Improved Density Peaks Clustering Algorithm for Encrypted Malicious Traffic Detection. The Journal of Supercomputing, 76, 7489-7518. [Google Scholar] [CrossRef]
|
|
[4]
|
Anderson, B. and McGrew, D. (2016) Identifying Encrypted Malware Traffic with Contextual Flow Data. Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, Vienna, 28 October 2016, 35-46. [Google Scholar] [CrossRef]
|
|
[5]
|
Erman, J., Mahanti, A., Arlitt, M.F., et al. (2007) Identifying and Discriminating between Web and Peer-to-Peer Traffic in the Network Core. Proceedings of the 16th international conference on World Wide Web, Banff, 8-12 May 2007, 883-892. [Google Scholar] [CrossRef]
|
|
[6]
|
陈子涵, 程光, 徐子恒, 等. 互联网加密流量检测、分类与识别研究综述[J]. 计算机学报, 2023, 46(5): 1060-1085.
|
|
[7]
|
Fan, Z. and Liu, R. (2017) Investigation of Machine Learning Based Network Traffic Classification. 2017 International Symposium on Wireless Communication Systems (ISWCS), Bologna, 28-31 August 2017, 1-6. [Google Scholar] [CrossRef]
|
|
[8]
|
Taylor, V.F., Spolaor, R., Conti, M. and Martinovic, I. (2018) Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Transactions on Information Forensics and Security, 13, 63-78. [Google Scholar] [CrossRef]
|
|
[9]
|
Al-Naami, K., Chandra, S., Mustafa, A., et al. (2016) Adaptive Encrypted Traffic Fingerprinting with Bi-Directional Dependence. Proceedings of the 32nd Annual Conference on Computer Security Applications, Los Angeles, 5-8 December 2016, 177-188. [Google Scholar] [CrossRef]
|
|
[10]
|
冷涛. 基于深度学习的加密流量分类研究综述[J]. 计算机与现代化, 2021(8): 112-120.
|
|
[11]
|
Wei, W., Ming, Z., Zeng, X., et al. (2017) Malware Traffic Classification Using Convolutional Neural Network for Representation Learning. 2017 International Conference on Information Networking (ICOIN), Da Nang, 11-13 January 2017, 712-717.
|
|
[12]
|
Wang, W., Zhu, M., Wang, J., Zeng, X., et al. (2017) End-to-End Encrypted Traffic Classification with One-Dimensional Convolution Neural Networks. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, 22-24 July 2017, 43-48.
|
|
[13]
|
Kumano, Y., Ata, S., Nakamura, N., et al. (2014) Towards Real-Time Processing for Application Identification of Encrypted Traffic. 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, 3-6 February 2014, 136-140. [Google Scholar] [CrossRef]
|
|
[14]
|
Lotfollahi, M., Siavoshani, J.M., Zade, R.S.H., et al. (2020) Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. Soft Computing, 24, 1999-2012. [Google Scholar] [CrossRef]
|
|
[15]
|
Lin, K., Xu, X. and Gao, H. (2021) TSCRNN: A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatiotemporal Features for Efficient Management of IIoT. Computer Networks, 190, Article 107974. [Google Scholar] [CrossRef]
|
|
[16]
|
Vaswani, A., Shazeer, N., Parmar, N., et al. (2017) Attention Is All You Need. Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, 4-9 December 2017, 6000-6010.
|
|
[17]
|
Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., et al. (2016) Characterization of Encrypted and VPN Traffic Using Time-Related Features. Proceedings of the 2nd International Conference on Information Systems Security and Privacy ICISSP, Rome, 19-21 February 2016, 407-414. [Google Scholar] [CrossRef]
|
|
[18]
|
Lashkari, A.H., Gil, G.D., Mamun, M.S.I., et al. (2017) Characterization of Tor Traffic Using Time Based Features. Proceedings of the 3rd International Conference on Information System Security and Privacy, Porto, 19-21 February 2017, 253-262.
|
|
[19]
|
Menzies, S., Greenwald, J. and Frank, A. (2007) An Analysis of Evaluation Metrics for Machine Learning Based Software Fault Prediction Models. Journal of Systems and Software, 80, 1910-1923.
|
|
[20]
|
Van Ede, T., Bortolameotti, R., Continella, A., et al. (2020) FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. Proceedings of the 27th Annual Network and Distributed System Security Symposium, San Diego, 23-26 February 2020, 1-18. [Google Scholar] [CrossRef]
|