参考文献
[1]Dainotti A, Pescape A, Claffy K C. Issues and future directions in traffic classification[J]. IEEE Network, 2012, 26(1): 3540[2]赵菁. IPsec VPN与SSL VPN比较与分析[J]. 数字技术与应用, 2017 (10): 183184[3]冯文博, 洪征, 吴礼发, 等. 网络协议识别技术综述[J]. 计算机应用, 2019, 39(12): 36043614[4]Moore A W, Papagiannaki K. Toward the accurate identification of network applications[C] Proc of Int Workshop on Passive and Active Network Measurement. Berlin: Springer, 2005: 4154[5]Sen S, Spatscheck O, Wang D. Accurate, scalable innetwork identification of P2P traffic using application signatures[C] Proc of the 13th Int Conf on World Wide Web. New York: ACM, 2004: 512521[6]Velan P, ermák M, eleda P, et al. A survey of methods for encrypted traffic classification and analysis[J]. International Journal of Network Management, 2015, 25(5): 355374[7]于海东, 邢明. 基于机器学习多模型的SSL加密威胁检测技术研究和应用[J]. 信息安全研究, 2021, 7(增刊1): 151157[8]王伟. 基于深度学习的网络流量分类及异常检测方法研究[D]. 合肥: 中国科学技术大学, 2018[9]Wang W, Zhu M, Wang J, et al. Endtoend encrypted traffic classification with onedimensional convolution neural networks[C] Proc of the 2017 IEEE Int Conf on Intelligence and Security Informatics (ISI). Piscataway, NJ: IEEE, 2017: 4348[10]Wang Z. The applications of deep learning on traffic identification[J]. BlackHat USA, 2015, 24(11): 110[11]Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: Multilevel traffic classification in the dark[C] Proc of the 2005 Conf on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2005: 229240 [12]Iliofotou M, Pappu P, Faloutsos M, et al. Network monitoring using traffic dispersion graphs (TDGS)[C] Proc of the 7th ACM SIGCOMM Conf on Internet Measurement. New York: ACM, 2007: 315320[13]Shen M, Zhang J, Zhu L, et al. Accurate decentralized application identification via encrypted traffic analysis using graph neural networks[J]. IEEE Trans on Information Forensics and Security, 2021, 16: 23672380[14]Sun B, Yang W, Yan M, et al. An encrypted traffic classification method combining graph convolutional network and autoencoder[C] Proc of the 39th IEEE Int Performance Computing and Communications Conf (IPCCC). Piscataway, NJ: IEEE, 2020: 18[15]Mo S, Wang Y, Xiao D, et al. Encrypted traffic classification using graph convolutional networks[C] Proc of Int Conf on Advanced Data Mining and Applications. Berlin: Springer, 2020: 207219[16]康鹏, 杨文忠, 马红桥. TLS协议恶意加密流量识别研究综述[J]. 计算机工程与应用, 2022, 58(12): 111[17]王宇航, 姜文刚, 翟江涛, 等. 面向SSL VPN加密流量的识别方法[J]. 计算机工程与应用, 2022, 58(1): 143151[18]王琳, 封化民, 刘飚, 等. 基于混合方法的SSL VPN加密流量识别研究[J]. 计算机应用与软件, 2019, 36(2): 315322[19]王兆慧, 沈华伟, 曹婍, 等. 图分类研究综述[J]. 软件学报, 2022, 33(1): 171192
|