Review and perspective on encrypted traffic identification research
Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification...
Saved in:
Main Authors: | Wu-bin PAN, Guang CHENG, Xiao-jun GUO, Shun-xiang HUANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016187/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Encrypted traffic identification scheme based on sliding window and randomness features
by: LIU Jiachi, et al.
Published: (2024-08-01) -
Survey of encrypted malicious traffic detection based on deep learning
by: Mingfang ZHAI, et al.
Published: (2020-06-01) -
A robust encrypted traffic identification scheme based on graph neural network
by: LI Mengxiang, et al.
Published: (2024-06-01) -
Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
by: Xuejiao Chen, et al.
Published: (2015-12-01) -
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
by: Guozhen SHI, et al.
Published: (2023-02-01)