[1] CALLANAN C, DRIES-ZIEKENHEINER H.Leaping over the firewall:a review of censorship circumvention tools[EB/OL]. [2020-06-10]. https://freedomhouse.org/sites/default/files/inline_images/Censorship.pdf. [2] IANA.DNS root, IP addressing, and Internet protocol resources[EB/OL]. [2020-07-09]. http://www.iana.org/. [3] Open and Extensible LGPLv3 Deep Packet Inspection Library[EB/OL]. [2020-07-09]. https://www.ntop.org/products/deep-packet-inspection/ndpi/. [4] Libprotoident[EB/OL]. [2020-07-09]. https://research.wand.net.nz/software/libprotoident.php. [5] L7 filter[EB/OL]. [2020-07-09]. http://l7-filter.sourceforge.net/. [6] OpenDPI[EB/OL]. [2020-07-09]. https://github.com/thomasbhatia/OpenDPI. [7] BUJLOW T, CARELA-ESPANOL V, BARLET-ROS P.Independent comparison of popular DPI tools for traffic classification[J]. Computer Networks, 2015, 76:75-89. [8] 何杭松.基于Xgboost算法的Shadowsocks流量识别研究[J]. 软件导刊, 2018, 17(12): 200-203. HE H S.Research on Shadowsocks traffic identification based on Xgboost algorithm[J]. Software Guide, 2018, 17(12): 200-203.(in Chinese) [9] DENG Z, LIU Z, CHEN Z, et al. The random forest based detection of Shadowsocks traffic[C]//Proceedings of the 9th IEEE International Conference on Intelligent Human-Machine Systems and Cybernetics.Washington D.C., USA:IEEE Press, 2017:75-78. [10] ZENG X, CHEN X, SHAO G, et al. Flow context and host behavior based Shadowsocks traffic identification[J]. IEEE Access, 2019, 7:41017-41032. [11] CHENG J X, LI Y, HUANG C, et al. ACER:detecting Shadowsocks server based on active probe technology[J]. Journal of Computer Virology and Hacking Techniques, 2020, 16(3): 217-227. [12] HAN Z H, CHEN X S, ZENG X M, et al. Detecting proxy user based on communication behavior portrait[J]. The Computer Journal, 2019, 62(12): 1777-1792. [13] ACETO G, CIUONZO D, MONTIERI A, et al. Multi-classification approaches for classifying mobile app traffic[J]. Journal of Network and Computer Applications, 2018, 103:131-145. [14] ACETO G, CIUONZO D, MONTIERI A, et al. Mobile encrypted traffic classification using deep learning:experimental evaluation, lessons learned, and challenges[J]. IEEE Transactions on Network and Service Management, 2019, 16(2): 445-458. [15] ZHANG Y, CHEN J, CHEN K, et al. Network traffic identification of several open source secure proxy protocols[J]. International Journal of Network Management, 2019, 31(2): 209-220. [16] ZHUO Z, ZHANG X, LI R, et al. A multi-granularity heuristic-combining approach for censorship circumvention activity identification[J]. Security and Communication Networks, 2016, 9(16): 3178-3189. [17] VELAN P, ČERMAK M, ČELEDA P, et al. A survey of methods for encrypted traffic classification and analysis[J]. International Journal of Network Management, 2015, 25(5): 355-374. [18] Pkt_Analyser Github[EB/OL]. [2020-06-10]. https://github.com/gpsvncl/Pkt_Analyser. [19] 陈雪娇, 王攀, 俞家辉.基于卷积神经网络的加密流量识别方法[J]. 南京邮电大学学报(自然科学版), 2018, 38(6): 36-41. CHEN X J, WANG P, YU J H.CNN based encrypted traffic identification method[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2018, 38(6): 36-41.(in Chinese) [20] RUKHIN A, SOTO J, NECHVATAL J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[EB/OL]. [2020-06-10]. https://www.onacademic.com/detail. [21] NIST sp 800_22_tests[EB/OL]. [2020-06-10]. https://github.com/dj-on-github/sp800_22_tests. [22] OORD A V D, DIELEMAN S, ZEN H, et al. WaveNet:a generative model for raw audio[EB/OL]. [2020-06-10]. https://arxiv.org/abs/1609.03499. [23] AYTAR Y, VONDRICH C, TORRALBA A.SoundNet:learning sound representations from unlabeled video[C]//Proceedings of the 29th Conference on Neural Information Processing Systems.Washington D.C., USA:IEEE Press, 2016:892-900. [24] Selenium[EB/OL]. [2020-06-10]. https://www.selenium.dev/. [25] ChinaZ[EB/OL]. [2020-06-10]. https://www.chinaz.com/. [26] Scikit-Learn[EB/OL]. [2020-06-10]. https://scikit-learn.org/stable/. [27] Tensorflow[EB/OL]. [2020-06-10]. https://www.tensorflow.org/?hl=zh-cn. [28] Shadowsocks[EB/OL]. [2020-06-10]. https://shadowsocks.org/en/spec/Protocol.html. [29] Shadowsocks Github[EB/OL]. [2020-06-10]. https://github.com/shadowsocks. |