[1]TOUCH J,KOJO M,LEAR E,et al.Service name and transport protocol port number registry [EB/OL].[2018-06-06].http://www.iana.org/assignments/port-numbers.
[2]KHALIFE J,HAJJAR A,DIAZ-VERDEJO J.A multilevel taxonomy and requirements for an optimal traffic-classification model[J].International Journal of Network Management,2014,24(2):101-120.
[3]PARK B C,WON Y J,KIM M S,et al.Towards automated application signature generation for traffic identification[C]//Proceedings of Network Operations and Management Symposium.Washnington D.C.,USA:IEEE Press,2008:160-167.
[4]SHERRY J,LAN C,POPA R A,et al.Blindbox:deep packet inspection over encrypted traffic[C]//Proceedings of ACM Conference on Special Interest Group on Data Communication.New York,USA:ACM Press,2015:213-226.
[5]陈伟,胡磊,杨龙.基于载荷特征的加密流量快速识别方法[J].计算机工程,2012,38(12):22-25.
[6]MENG P,ZHOU G,MENG J.Fast identification of encrypted traffic via large-scale sparse screening[C]//Proceedings of International Conference on Advanced Cloud & Big Data.Washington D.C.,USA:IEEE Press,2017:273-278.
[7]OKADA Y,ATA S,NAKAMURA N,et al.Comparisons of machine learning algorithms for application identification of encrypted traffic[C]//Proceedings of International Conference on Machine Learning and Applications and Workshops.Washington D.C.,USA:IEEE Press,2011:358-361.
[8]WANG Z.The applications of deep learning on traffic identification[C]//Proceedings of Black Hat 2015.Singapore:[s.n.],2015.
[9]LOTFOLLAHI M,ZADE R S H,SIAVOSHANI M J,et al.Deep packet:a novel approach for encrypted traffic classification using deep learning[J/OL].[2018-06-06].http://cn.arxiv.org/pdf/1709.02656v3.
[10]王勇,周慧怡,俸皓,等.基于深度卷积神经网络的网络流量分类方法[J].通信学报,2018,39(1):14-23.
[11]赵英,韩春昊.马尔科夫模型在网络流量分类中的应用与研究[J].计算机工程,2018,44(5):291-295.
[12]CAUDILL M.Neural networks primer,part I[J].AI Expert,1987,2(12):46-52.
(下转第153页)
(上接第147页)
[13]陈雪娇,王攀,刘世栋.网络应用流类别不平衡环境下的SSL 加密应用流识别关键技术[J].电信科学,2015,31(12):83-89.
[14]CHAWLA N V,BOWYER K W,HALL L O,et al.SMOTE:synthetic minority over-sampling technique[J].Journal of Artificial Intelligence Research,2002,16(1):321-357.
[15]DRAPER-GIL G,LASHKARI A,MAMUN M,et al.Characterization of encrypted and VPN traffic using time-related features[C]//Proceedings of the 2nd International Conference on Information Systems Security and Privacy.Setúbal,Portugal:Science and Technology Publications,2016,407-414.
[16]GitHub,Inc.Keras:deep learning for humans[EB/OL].[2018-06-06].https://github.com/fchollet/keras.
[17]ABADI M,AGARWAL A,BARHAM P,et al.TensorFlow:large-scale machine learning on heterogeneous systems[EB/OL].[2018-06-06].http://cn.arxiv.org/pdf/1603.04467v1.
[18]KIM H,CLAFFY K,FOMENKOV M,et al.Internet traffic classification demystified:myths,caveats,and the best practices[C]//Proceedings of the 2008 ACM CoNEXT Conference.New York,USA:ACM Press,2008:1-12.
|