Review and perspective on encrypted traffic identification research

Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification...

Full description

Saved in:
Bibliographic Details
Main Authors: Wu-bin PAN, Guang CHENG, Xiao-jun GUO, Shun-xiang HUANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2016-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539550649778176
author Wu-bin PAN
Guang CHENG
Xiao-jun GUO
Shun-xiang HUANG
author_facet Wu-bin PAN
Guang CHENG
Xiao-jun GUO
Shun-xiang HUANG
author_sort Wu-bin PAN
collection DOAJ
description Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification technology was summarized,and identification technology was compared from multiple views.Third,the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced,such as tunneling,traffic camouflage technology,new protocols of HTTP/2.0 and QUIC.Finally,prospect trends and directions of future research on encrypted traffic identification were discussed.
format Article
id doaj-art-0213ee5de86a4d3399b76a45adc6a0ae
institution Kabale University
issn 1000-436X
language zho
publishDate 2016-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-0213ee5de86a4d3399b76a45adc6a0ae2025-01-14T06:56:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-09-013715416759703645Review and perspective on encrypted traffic identification researchWu-bin PANGuang CHENGXiao-jun GUOShun-xiang HUANGConsidering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification technology was summarized,and identification technology was compared from multiple views.Third,the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced,such as tunneling,traffic camouflage technology,new protocols of HTTP/2.0 and QUIC.Finally,prospect trends and directions of future research on encrypted traffic identification were discussed.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/encrypted traffic identificationnetwork managementtraffic engineeringtraffic camouflagingHTTP/2.0
spellingShingle Wu-bin PAN
Guang CHENG
Xiao-jun GUO
Shun-xiang HUANG
Review and perspective on encrypted traffic identification research
Tongxin xuebao
encrypted traffic identification
network management
traffic engineering
traffic camouflaging
HTTP/2.0
title Review and perspective on encrypted traffic identification research
title_full Review and perspective on encrypted traffic identification research
title_fullStr Review and perspective on encrypted traffic identification research
title_full_unstemmed Review and perspective on encrypted traffic identification research
title_short Review and perspective on encrypted traffic identification research
title_sort review and perspective on encrypted traffic identification research
topic encrypted traffic identification
network management
traffic engineering
traffic camouflaging
HTTP/2.0
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/
work_keys_str_mv AT wubinpan reviewandperspectiveonencryptedtrafficidentificationresearch
AT guangcheng reviewandperspectiveonencryptedtrafficidentificationresearch
AT xiaojunguo reviewandperspectiveonencryptedtrafficidentificationresearch
AT shunxianghuang reviewandperspectiveonencryptedtrafficidentificationresearch