| [1]中国互联网络信息中心. 第53次中国互联网络发展状况统计报告[EBOL]. (20240322) [20250209]. https:www.cnnic.net.cnn420240322c8810964.html[2]Velan P, ermák M, eleda P, et al. A survey of methods for encrypted traffic classification and analysis[J]. International Journal of Network Management, 2015, 25(5): 355374[3]Azab A, Khasawneh M, Alrabaee S, et al. Network traffic classification: Techniques, datasets, and challenges[J]. Digital Communications and Networks, 2024, 10(3): 676692[4]Alam S, Sonbhadra S K, Agarwal S, et al. Oneclass support vector classifiers: A survey[J]. KnowledgeBased Systems, 2020, 196(78): 105754[5]Mohammadi M, Rashid T A, Karim S H T, et al. A comprehensive survey and taxonomy of the SVMbased intrusion detection systems[J]. Journal of Network and Computer Applications, 2021, 178: 102983[6]Guezzaz A, Benkirane S, Azrour M, et al. A reliable network intrusion detection approach using decision tree with enhanced data quality[J]. Security and Communication Networks, 2021, 1: 1230593[7]AlOmari M, Rawashdeh M, Qutaishat F, et al. An intelligent treebased intrusion detection model for cyber security[J]. Journal of Network and Systems Management, 2021, 29(2): 20[8]Li L, Zhang H, Peng H, et al. Nearest neighbors based density peaks approach to intrusion detection[J]. Chaos, Solitons & Fractals, 2018, 110: 3340[9]Vinayakumar R, Soman K P, Poornachandran P. Applying convolutional neural network for network intrusion detection[C] Proc of the 2017 Int Conf on Advances in Computing, Communications and Informatics (ICACCI). Piscataway, NJ: IEEE, 2017: 12221228[10]Park S H, Park H J, Choi Y J. RNNbased prediction for network intrusion detection[C] Proc of the 2020 Int Conf on Artificial Intelligence in Information and Communication (ICAIIC). Piscataway, NJ: IEEE, 2020: 572574[11]Andresini G, Appice A, Malerba D. Autoencoderbased deep metric learning for network intrusion detection[J]. Information Sciences, 2021, 569: 706727[12]Wang Z. The applications of deep learning on traffic identification[J]. BlackHat USA, 2015, 24(11): 110[13]Wang W, Zhu M, Zeng X, et al. Malware traffic classification using convolutional neural network for representation learning[C] Proc of the 2017 Int Conf on Information Networking (ICOIN). Piscataway, NJ: IEEE, 2017: 712717[14]Yao H, Gao P, Wang J, et al. Capsule network assisted IoT traffic classification mechanism for smart cities[J]. IEEE Internet of Things Journal, 2019, 6(5): 75157525[15]Zhou X, Liang W, Li W, et al. Hierarchical adversarial attacks against graphneuralnetworkbased IoT network intrusion detection system[J]. IEEE Internet of Things Journal, 2021, 9(12): 93109319[16]Sun B, Yang W, Yan M, et al. An encrypted traffic classification method combining graph convolutional network and autoencoder[C] Proc of the 39th Int Performance Computing and Communications Conf (IPCCC). Piscataway, NJ: IEEE, 2020: 18[17]Mo S, Wang Y, Xiao D, et al. Encrypted traffic classification using graph convolutional networks[C] Proc of the 16th Int Conf on Advanced Data Mining and Applications (ADMA 2020). Berlin: Springer, 2020: 207219[18]Lo W W, Layeghy S, Sarhan M, et al. Egraphsage: A graph neural network based intrusion detection system for IoT[C] Proc of the 2022 IEEEIFIP Network Operations and Management Symp (NOMS 2022). Piscataway, NJ: IEEE, 2022: 19[19]Zhang L, Tan L, Shi H, et al. Malicious traffic classification for IoT based on graph attention network and long shortterm memory network[C] Proc of the 24th AsiaPacific Network Operations and Management Symposium (APNOMS). Piscataway, NJ: IEEE, 2023: 5459[20]喻晓伟, 陈丹伟. 基于注意力机制的图神经网络加密流量分类研究[J]. 信息安全研究, 2023, 9(1): 1321 |