[1] |
CARLI L D,TORRES R,MODELO-HOWARD G,et al.Botnet protocol inference in the presence of encrypted traffic[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2017:1-7.
|
[2] |
ZHANG Yu,PAN Xiaogming.APT attacks and defenses[J].Journal of Tsinghua University(Science and Technology),2017,57(11):1127-1133.(in Chinese)张瑜,潘小明.APT攻击与防御[J].清华大学学报(自然科学版),2017,57(11):1127-1133.
|
[3] |
CHENG Guang,CHEN Yunxiang.Identification method of encrypted traffic based on support vector machine[J].Journal of Southeast University(Natural Science Edition),2017,47(4):655-659.(in Chinese)程光,陈玉祥.基于支持向量机的加密流量识别方法[J].东南大学学报(自然科学版),2017,47(4):655-659.
|
[4] |
TANKARD C.Advanced persistent threats and how to monitor and deter them[J].Network Security,2011(8):16-19.
|
[5] |
LAN Jinghong,LIU Shengli,WU Shuang,et al.Research on ensemble classification model of trojan traffic detection[J].Journal of Xi'an Jiaotong University,2015,49(8):84-89.(in Chinese)兰景宏,刘胜利,吴双,等.用于木马流量检测的集成分类模型[J].西安交通大学学报,2015,49(8):84-89.
|
[6] |
GLASSEY R T,SCHAEFFER J.Analysis of the SSL 3.0 protocol[C]//Proceedings of the 2nd USENIX Workshop on Electronic Commerce.New York,USA:ACM Press,1996:29-40.
|
[7] |
OKADA Y,ATA S,NAKAMURA N,et al.Comparisons of machine learning algorithms for application identification of encrypted traffic[C]//Proceedings of the 10th IEEE International Conference on Machine Learning and Applications.Washington D.C.,USA:IEEE Press,2011:358-361.
|
[8] |
LOTFOLLAHI M,ZADE R S H,SIAVOSHANI M J,et al.Deep packet:a novel approach for encrypted traffic classification using deep learning[EB/OL].[2019-02-07].https://www.researchgate.net/publication/319622754_Deep_Packet_A_Novel_Approach_For_Encrypted_Traffic_Classification_Using_Deep_Learning.
|
[9] |
ZHAO Bo,GUO Hong,LIU Qinrang,et al.Protocol independent identification of encrypted traffic based on weighted cumulative sum test[J].Journal of Software,2013,24(6):1334-1345.(in Chinese)赵博,郭虹,刘勤让,等.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345.
|
[10] |
VELAN P,CERMAK M,CELEDA P,et al.A survey of methods for encrypted traffic classification and analysis[J].International Journal of Network Management,2015,25(5):355-374.
|
[11] |
CANVEL B,HILTGEN A,VAUDENAY S,et al.Password interception in a SSL/TLS channel[C]//Proceedings of CRYPTO'03.Berlin,Germany:Springer,2003:583-599.
|
[12] |
PAN Wubin,CHENG Guang,GUO Xiaojun,et al.Review and perspective on encrypted traffic identification research[J].Journal on Communications,2016,37(9):154-167.(in Chinese)潘吴斌,程光,郭晓军,等.网络加密流量识别研究综述及展望[J].通信学报,2016,37(9):154-167.
|
[13] |
YANG Jian.Design and implementation of SSL man-in-the-middle attack detection system[D].Nanjing:Southeast University,2016.(in Chinese)杨健.SSL中间人攻击检测系统的设计与实现[D].南京:东南大学,2016.
|
[14] |
ZHOU Haiyun.Research on protocol identification technology based on hidden Markov model[D].Tianjing:Tianjing University of Technology,2013.(in Chinese)周海云.基于隐马尔可夫模型的协议识别技术的研究[D].天津:天津理工大学,2013.
|
[15] |
BAI Yu.Markov chain based encrypted stream identification system research and implement[D].Beijing:Beijing Institute of Technology,2015.(in Chinese)白宇.基于马尔可夫链的加密流识别系统研究与实现[D].北京:北京理工大学,2015.
|
[16] |
ZHANG Tianxiong.Anomaly detection for communication flows based on HMM[J].Intelligent Computer and Applications,2018,8(4):121-124.(in Chinese)张天雄.基于HMM的通信流量异常检测[J].智能计算机与应用,2018,8(4):121-124.
|
[17] |
FU Peipei.Research on fine-grained classification technology of network application based on SSL protocol[D].Beijing:Beijing University of Posts and Telecommunications,2013.(in Chinese)扶佩佩.针对SSL协议的网络应用精细化分类技术研究[D].北京:北京邮电大学,2013.
|
[18] |
ACETO G,CIUONZO D,MONTIERI A,et al.Multi-classification approaches for classifying mobile App traffic[J].Journal of Network and Computer App-lications,2018,103:131-145.
|