1 |
|
2 |
陈良臣, 高曙, 刘宝旭, 等. 网络加密流量识别研究进展及发展趋势. 信息网络安全, 2019, (3): 19- 25.
URL
|
|
CHEN L C, GAO S, LIU B X, et al. Research status and development trends on network encrypted traffic identification. Netinfo Security, 2019, (3): 19- 25.
URL
|
3 |
WOO S, PARK J, LEE J Y, et al. CBAM: convolutional block attention module[C]//Proceedings of the 15th European Conference on Computer Vision. New York, USA: ACM Press, 2018: 3-19.
|
4 |
张蕾, 崔勇, 刘静, 等. 机器学习在网络空间安全研究中的应用. 计算机学报, 2018, 41 (9): 1943- 1975.
URL
|
|
ZHANG L, CUI Y, LIU J, et al. Application of machine learning in cyberspace security research. Chinese Journal of Computers, 2018, 41 (9): 1943- 1975.
URL
|
5 |
ANDERSON B, MCGREW D. Identifying encrypted malware traffic with contextual flow data[C]//Proceedings of 2016 ACM Workshop on Artificial Intelligence and Security. New York, USA: ACM Press, 2016: 35-46.
|
6 |
胡斌, 周志洪, 姚立红, 等. 结合报文负载与流指纹特征的恶意流量检测. 计算机工程, 2020, 46 (11): 157- 163.
URL
|
|
HU B, ZHOU Z H, YAO L H, et al. Malicious traffic detection combining features of packet payload and stream fingerprint. Computer Engineering, 2020, 46 (11): 157- 163.
URL
|
7 |
WANG W, ZHU M, WANG J L, et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]//Proceedings of IEEE International Conference on Intelligence and Security Informatics. Washington D. C., USA: IEEE Press, 2017: 43-48.
|
8 |
WANG W, ZHU M, ZENG X W, et al. Malware traffic classification using convolutional neural network for representation learning[C]//Proceedings of International Conference on Information Networking. Washington D. C., USA: IEEE Press, 2017: 712-717.
|
9 |
韦佶宏, 郑荣锋, 刘嘉勇. 基于混合神经网络的恶意TLS流量识别研究. 计算机工程与应用, 2021, 57 (7): 107- 114.
URL
|
|
WEI J H, ZHENG R F, LIU J Y. Research on malicious TLS traffic identification based on hybrid neural network. Computer Engineering and Applications, 2021, 57 (7): 107- 114.
URL
|
10 |
程华, 谢金鑫, 陈立皇. 基于CNN的加密C&C通信流量识别方法. 计算机工程, 2019, 45 (8): 31-34, 41.
URL
|
|
CHENG H, XIE J X, CHEN L H. CNN-based encrypted C&C communication traffic identification method. Computer Engineering, 2019, 45 (8): 31-34, 41.
URL
|
11 |
王攀, 陈雪娇. 基于堆栈式自动编码器的加密流量识别方法. 计算机工程, 2018, 44 (11): 140-147, 153.
URL
|
|
WANG P, CHEN X J. SAE-based encrypted traffic identification method. Computer Engineering, 2018, 44 (11): 140-147, 153.
URL
|
12 |
陈明豪, 祝跃飞, 芦斌, 等. 基于Attention-CNN的加密流量应用类型识别. 计算机科学, 2021, 48 (4): 325- 332.
URL
|
|
CHEN M H, ZHU Y F, LU B, et al. Classification of application type of encrypted traffic based on Attention-CNN. Computer Science, 2021, 48 (4): 325- 332.
URL
|
13 |
邹源, 张甲, 江滨. 基于LSTM循环神经网络的恶意加密流量检测. 计算机应用与软件, 2020, 37 (2): 308- 312.
URL
|
|
ZOU Y, ZHANG J, JIANG B. Detection of malicious encrypted traffic based on LSTM recurrent neural network. Computer Applications and Software, 2020, 37 (2): 308- 312.
URL
|
14 |
LIU X, YOU J, WU Y, et al. Attention-based bidirectional GRU networks for efficient HTTPS traffic classification. Information Sciences, 2020, 541, 297- 315.
doi: 10.1016/j.ins.2020.05.035
|
15 |
吴迪, 方滨兴, 崔翔, 等. BotCatcher: 基于深度学习的僵尸网络检测系统. 通信学报, 2018, 39 (8): 18- 28.
URL
|
|
WU D, FANG B X, CUI X, et al. BotCatcher: botnet detection system based on deep learning. Journal on Communications, 2018, 39 (8): 18- 28.
URL
|
16 |
ZOU Z, GE J G, ZHENG H B, et al. Encrypted traffic classification with a convolutional long short-term memory neural network[C]//Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications. Washington D. C., USA: IEEE Press, 2019: 329-334.
|
17 |
李小剑, 谢晓尧, 徐洋, 等. 基于CNN⁃SIndRNN的恶意TLS流量快速识别方法. 计算机工程, 2022, 48 (4): 148-157, 164.
URL
|
|
LI X J, XIE X Y, XU Y, et al. Fast identification method of malicious TLS traffic based on CNN-SIndRNN. Computer Engineering, 2022, 48 (4): 148-157, 164.
URL
|
18 |
张彦晖, 吕娜, 刘鹏飞, 等. 基于卷积注意力门控循环网络的加密流量分类方法. 信号处理, 2021, 37 (7): 1180- 1188.
URL
|
|
ZHANG Y H, LÜ N, LIU P F, et al. An encrypted traffic classification method based on convolutional attention gated recurrent networks. Journal of Signal Processing, 2021, 37 (7): 1180- 1188.
URL
|
19 |
蒋彤彤, 尹魏昕, 蔡冰, 等. 基于层次时空特征与多头注意力的恶意加密流量识别. 计算机工程, 2021, 47 (7): 101- 108.
URL
|
|
JIANG T T, YIN W X, CAI B, et al. Encrypted malicious traffic identification based on hierarchical spatiotemporal feature and multi-head attention. Computer Engineering, 2021, 47 (7): 101- 108.
URL
|
20 |
孙懿, 高见, 顾益军. 融合一维Inception结构与ViT的恶意加密流量检测. 计算机工程, 2023, 49 (1): 154- 162.
URL
|
|
SUN Y, GAO J, GU Y J. Malicious encrypted traffic detection integrating one-dimensional Inception structure and ViT. Computer Engineering, 2023, 49 (1): 154- 162.
URL
|
21 |
LIN X J, XIONG G, GOU G P, et al. ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification[C]//Proceedings of the ACM Web Conference. New York, USA: ACM Press, 2022: 633-642.
|
22 |
周飞燕, 金林鹏, 董军. 卷积神经网络研究综述. 计算机学报, 2017, 40 (6): 1229- 1251.
URL
|
|
ZHOU F Y, JIN L P, DONG J. Review of convolutional neural network. Chinese Journal of Computers, 2017, 40 (6): 1229- 1251.
URL
|
23 |
WANG W, SHENG Y Q, WANG J L, et al. HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access, 2017, 6, 1792- 1806.
doi: 10.1109/ACCESS.2017.2780250
|
24 |
|
25 |
DRAPER-GIL G, LASHKARI A H, MAMUN M S I, et al. Characterization of encrypted and VPN traffic using time-related features[C]//Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Washington D. C., USA: IEEE Press, 2016: 407-414.
|