Review and perspective on encrypted traffic identification research
Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539550649778176 |
---|---|
author | Wu-bin PAN Guang CHENG Xiao-jun GUO Shun-xiang HUANG |
author_facet | Wu-bin PAN Guang CHENG Xiao-jun GUO Shun-xiang HUANG |
author_sort | Wu-bin PAN |
collection | DOAJ |
description | Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification technology was summarized,and identification technology was compared from multiple views.Third,the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced,such as tunneling,traffic camouflage technology,new protocols of HTTP/2.0 and QUIC.Finally,prospect trends and directions of future research on encrypted traffic identification were discussed. |
format | Article |
id | doaj-art-0213ee5de86a4d3399b76a45adc6a0ae |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-0213ee5de86a4d3399b76a45adc6a0ae2025-01-14T06:56:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-09-013715416759703645Review and perspective on encrypted traffic identification researchWu-bin PANGuang CHENGXiao-jun GUOShun-xiang HUANGConsidering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification technology was summarized,and identification technology was compared from multiple views.Third,the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced,such as tunneling,traffic camouflage technology,new protocols of HTTP/2.0 and QUIC.Finally,prospect trends and directions of future research on encrypted traffic identification were discussed.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/encrypted traffic identificationnetwork managementtraffic engineeringtraffic camouflagingHTTP/2.0 |
spellingShingle | Wu-bin PAN Guang CHENG Xiao-jun GUO Shun-xiang HUANG Review and perspective on encrypted traffic identification research Tongxin xuebao encrypted traffic identification network management traffic engineering traffic camouflaging HTTP/2.0 |
title | Review and perspective on encrypted traffic identification research |
title_full | Review and perspective on encrypted traffic identification research |
title_fullStr | Review and perspective on encrypted traffic identification research |
title_full_unstemmed | Review and perspective on encrypted traffic identification research |
title_short | Review and perspective on encrypted traffic identification research |
title_sort | review and perspective on encrypted traffic identification research |
topic | encrypted traffic identification network management traffic engineering traffic camouflaging HTTP/2.0 |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/ |
work_keys_str_mv | AT wubinpan reviewandperspectiveonencryptedtrafficidentificationresearch AT guangcheng reviewandperspectiveonencryptedtrafficidentificationresearch AT xiaojunguo reviewandperspectiveonencryptedtrafficidentificationresearch AT shunxianghuang reviewandperspectiveonencryptedtrafficidentificationresearch |