Computer and Modernization ›› 2021, Vol. 0 ›› Issue (08): 112-120.
Previous Articles Next Articles
Online:
2021-08-19
Published:
2021-08-19
LENG Tao , . A Survey of Encrypted Traffic Classification Based on Deep Learning[J]. Computer and Modernization, 2021, 0(08): 112-120.
[1] | ROUGHAN M, SEN S, SPATSCHECK O, et al. Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification[C]// Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. 2004:135-148. |
[2] | LASHKARI A H, GIL G D, MAMUN M S I, et al. Characterization of Tor traffic using time based features[C]// Proceedings of the 3rd International Conference on Information Systems Security and Privacy. 2017:253-262. |
[3] | 陈良臣,高曙,刘宝旭,等. 网络加密流量识别研究进展及发展趋势[J]. 信息网络安全, 2019(3):19-25. |
[4] | SHAPIRA T, SHAVITT Y. Flowpic: Encrypted Internet traffic classification is as easy as image recognition[C]// IEEE Conference on Computer Communications Workshops. 2019:680-687. |
[5] | SIRINAM P, IMANI M, JUAREZ M, et al. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018:1928-1943. |
[6] | DE LA CADENA W, MITSEVA A, HILLER J, et al. TrafficSliver: Fighting website fingerprinting attacks with traffic splitting[C]// Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020:1971-1985. |
[7] | ABUSNAINA A, JANG R, KHORMALI A, et al. DFD: Adversarial learning-based approach to defend against website fingerprinting[C]// IEEE INFOCOM 2020-IEEE Conference on Computer Communications. 2020:2459-2468. |
[8] | SHEN M, LIU Y T, CHEN S Q, et al. Fine-grained webpage fingerprinting using only packet length information of encrypted traffic[J]. IEEE Transactions on Information Forensics and Security, 2021,16:2046-2059. |
[9] | SHEN M, ZHANG J P, ZHU L H, et al. Accurate decentralized application identification via encrypted traffic analysis using graph neural networks[J]. IEEE Transactions on Information Forensics and Security, 2021,16:2367-2380. |
[10] | VAN EDE T, BORTOLAMEOTTI R, CONTINELLA A, et al. Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic[C]// Network and Distributed System Security Symposium. 2020. |
[11] | BAHRAMALI A, HOUMANSADR A, SOLTANI R, et al. Practical traffic analysis attacks on secure messaging applications[C]// Network and Distributed System Security Symposium. 2020. |
[12] | ZHANG W, MENG Y, LIU Y G, et al. Homonit: Monitoring smart home apps from encrypted traffic[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018:1074-1088. |
[13] | YU J L, LUO B, MA J, et al. You are what you broadcast: Identification of mobile and IoT devices from (public) WiFi[C]// The 29th USENIX Security Symposium. 2020:55-72. |
[14] | WAN Y X, XU K, XUE G L, et al. IoTArgos: A multi-layer security monitoring system for Internet-of-Things in smart homes[C]// IEEE Conference on Computer Communications. 2020:874-883. |
[15] | GU T B, FANG Z, ABHISHEK A, et al. IoTgaze: IoT security enforcement via wireless context analysis[C]// IEEE Conference on Computer Communications. 2020:884-893. |
[16] | SIVAKORN S, JEE K, SUN Y X, et al. Countering malicious processes with process-DNS association[C]// Network and Distributed System Security Symposium. 2019. |
[17] | YUAN B G, WANG J F, LIU D, et al. Byte-level malware classification based on markov images and deep learning[J]. Computers & Security, 2020,92:101740. |
[18] | LEE I, ROH H, LEE W. Encrypted malware traffic detection using incremental learning[C]// IEEE Conference on Computer Communications Workshops. 2020:1348-1349. |
[19] | NIU W N, XIE J, ZHANG X S, et al. HTTP-based APT malware infection detection using URL correlation analysis[J]. Security and Communication Networks, 2021, 2021:Article ID 6653386. |
[20] | 王伟. 基于深度学习的网络流量分类及异常检测方法研究[D]. 合肥:中国科学技术大学, 2018. |
[21] | WANG P, CHEN X J, YE F, et al. A survey of techniques for mobile service encrypted traffic classification using deep learning[J]. IEEE Access, 2019,7:54024-54033. |
[22] | TAHAEI H, AFIFI F, ASEMI A, et al. The rise of traffic classification in IoT networks: A survey[J]. Journal of Network and Computer Applications, 2020,154:102538. |
[23] | LOPEZ-MARTIN M, CARRO B, SANCHEZ-ESGUEVILLAS A, et al. Network traffic classifier with convolutional and recurrent neural networks for Internet of things[J]. IEEE Access, 2017,5:18042-18050. |
[24] | ZHANG J L, LI F H, YE F, et al. Autonomous unknown-application filtering and labeling for DL-based traffic classifier update[C]// IEEE Conference on Computer Communications. 2020:397-405. |
[25] | ZHAO L X, CAI L J, YU A M, et al. Prototype-based malware traffic classification with novelty detection[C]// International Conference on Information and Communications Security. 2019:3-17. |
[26] | KAMARUDIN M H, MAPLE C, WATSON T. Hybrid feature selection technique for intrusion detection system[J]. International Journal of High Performance Computing and Networking, 2019,13(2):232-240. |
[27] | MIMURA M. Adjusting lexical features of actual proxy logs for intrusion detection[J]. Journal of Information Security and Applications, 2020,50:102408. |
[28] | WANG P, LI S H, YE F, et al. PacketCGAN: Exploratory study of class imbalance for encrypted traffic classification using CGAN[C]// 2020 IEEE International Conference on Communications (ICC). 2020:1-7. |
[29] | VU L, BUI C T, NGUYEN Q U. A deep learning based method for handling imbalanced problem in network traffic classification[C]// Proceedings of the 8th International Symposium on Information and Communication Technology. 2017:333-339. |
[30] | REZAEI S, LIU X. How to achieve high classification accuracy with just a few labels: A semi-supervised approach using sampled packets[C]// The 19th Industrial Conference on Data Mining. 2019:28-42. |
[31] | DONG C, ZHANG C, LU Z G, et al. CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification[J]. Computer Networks, 2020,176:107258 |
[32] | REZAEI S, LIU X. Multitask learning for network traffic classification[C]// 2020 29th International Conference on Computer Communications and Networks. 2020:1-9. |
[33] | LIU C, HE L T, XIONG G, et al. FS-Net: A flow sequence network for encrypted traffic classification[C]// IEEE Conference on Computer Communications. 2019:1171-1179. |
[34] | ILIYASU A S, DENG H F. Semi-supervised encrypted traffic classification with deep convolutional generative adversarial networks[J]. IEEE Access, 2020,8:118-126. |
[35] | CUI S S, JIANG B, CAI Z Z, et al. A session-packets based encrypted traffic classification using capsule neural networks[C]// 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems(HPCC/SmartCity/DSS). 2019:429-436. |
[36] | WANG Z Y. The applications of deep learning on traffic identification[C]// USA Black Hat Conference. 2015. |
[37] | 薛文龙,于炯,郭志琦,等. 基于特征融合卷积神经网络的端到端加密流量分类[J/OL]. 计算机工程与应用, 2020:1-10(2020-08-31)[2021-04-01]. https://kns. cnki.net/kcms/detail/detail.aspx?dbcode=CAPJ&dbname=CAPJLAST&-filename=JSGG20200828006&v=UVJbamaWiqNeLlKu75%25mmd2B2OAyy%25mmd2Buvg0UUSmvO5Qw-KCPmtt71xrsu U%25mmd2FDXGUWziwd%25mmd2BSl. |
[38] | 范聂霏. 基于卷积神经网络的流量分类方法研究[M]. 武汉:华中师范大学, 2020. |
[39] | WANG W, SHENG Y Q, WANG J L, et al. HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection[J]. IEEE Access, 2017,6:1792-1806. |
[40] | ACETO G, CIUONZO D, MONTIERI A, et al. Mobile encrypted traffic classification using deep learning[C]// IEEE/ACM Network Traffic Measurement and Analysis Conference. 2018:1-8. |
[41] | WANG W, ZHU M, WANG J L, et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]// 2017 IEEE International Conference on Intelligence and Security Informatics. 2017:43-48. |
[42] | CHEN Z T, HE K, LI J, et al. Seq2Img: A sequence-to-image based approach towards IP traffic classification using convolutional neural networks[C]// 2017 IEEE International Conference on Big Data. 2017:1271-1276. |
[43] | LOTFOLLAHI M, ZADE R S H, SIAVOSHANI M J, et al. Deep packet: A novel approach for encrypted traffic classification using deep learning[J]. Soft Computing, 2020,24(3):1999-2012. |
[44] | HOCHST J, BAUMGARTNER L, HOLLICK M, et al. Unsupervised traffic flowclassification using a neural autoencoder[C]// 2017 IEEE 42nd Conference on Local Computer Networks. 2017:523-526. |
[45] | DRAPER-GIL G, LASHKARI A H, MAMUN M S I, et al. Characterization of encrypted and VPN traffic using time-related features[C]// Proceedings of the 2nd International Conference on Information Systems Security and Privacy. 2016:407-414. |
[46] | LIM H K, KIM J B, HEO J S, et al. Packet-based network traffic classification using deep learning[C]// The 1st International Conference on Artificial Intelligence in Information and Communication. 2019:46-51. |
[47] | HASIBI R, SHOKRI M, DEHGHAN M. Augmentation scheme for dealing with imbalanced network traffic classification using deep learning[J]. Arxiv Preprint Arxiv:1901.00204, 2019. |
[48] | LI D, ZHU Y F, LIN W. Traffic identification of mobile apps based on variational autoencoder network[C]// 2017 13th International Conference on Computational Intelligence and Security. 2017:287-291. |
[49] | ZHANG H P, WU C Q, GAO S, et al. An effective deep learning based scheme for network intrusion detection[C]// 2018 24th International Conference on Pattern Recognition. 2018:682-687. |
[50] | AYGUN R C, YAVUZ A G. Network anomaly detection with stochastically improved autoencoder based models[C]// 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing. 2017:193-198. |
[51] | ZENG Y, GU H X, WEI W T, et al. Deep-Full-Rang: A deep learning based network enerypted traffic classification and intrusion detection framework[J]. IEEE Access, 2019,7:45182-45190. |
[52] | ZOU Z, GE J G, ZHENG H B, et al. Encrypted traffic classification with a convolutional long short-term memory neural network[C]// 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). 2018:329-334. |
[1] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
[2] | MENG Na, FANG Wei-wei, LU Hong-ying. A DNN Compression Method for Environmental Sound Classification on Microcontroller Unit [J]. Computer and Modernization, 2024, 0(01): 80-86. |
[3] | LIN Wei. Incremental News Recommendation Method Based on Self-supervised Learning and Data Replay [J]. Computer and Modernization, 2023, 0(12): 1-6. |
[4] | LIANG Tian-kai, HUANG Kang-hua, LIU Kai-hang, LAN Lan, ZENG Bi. Deep Federated Image Classification Method Based on Bilateral Homomorphic Encryption [J]. Computer and Modernization, 2023, 0(12): 36-40. |
[5] | QIU Kai-xing, FENG Guang. A Multi-label Image Classification Model Based on Dual Feature Attention [J]. Computer and Modernization, 2023, 0(12): 41-47. |
[6] | ZHANG Bo-quan, MAI Hai-peng, CHEN Jia-min, Pang Jin-ju. White Matter Hyperintensities Segmentation Based on High Gray Value#br# Attention Mechanism [J]. Computer and Modernization, 2023, 0(12): 67-75. |
[7] | TANG Shi-qi, ZHOU Rui-ping, XIE Shi-bin, LIU Meng-chi, XIAO Wen, . Cross-language Multi-label Sentiment Classification Based on Stacked Denoising AutoEncoder [J]. Computer and Modernization, 2023, 0(11): 6-12. |
[8] | JIA Xiao-yao, . Breast Cancer Prediction and Feature Analysis Model Based on CatBoost and SHAP [J]. Computer and Modernization, 2023, 0(10): 32-38. |
[9] | LI Yan-man, WANG Bi-heng, ZHAO Ling-yan. Safety Helmet Detection Based on Lightweight YOLOv5 [J]. Computer and Modernization, 2023, 0(10): 59-64. |
[10] | LI Shi-da, XIANG Jian-wen. A Weakened Joint Reinforcement Method to Improve Robustness of Image Recognition Models [J]. Computer and Modernization, 2023, 0(10): 70-76. |
[11] | SHEN Jia-wei, LU Yi-ming, CHEN Xiao-yi, QIAN Mei-ling, LU Wei-zhong, . Review of Research on Human Behavior Detection Methods Based on Deep Learning [J]. Computer and Modernization, 2023, 0(09): 1-9. |
[12] | WU Tian, LIU Hai-hua, TONG Shun-yan. Image Classification Based on Deep Feedback CNN [J]. Computer and Modernization, 2023, 0(09): 82-86. |
[13] | LIU Chan-yi, HUANG Dan, XUE Lin-yan, WANG Tao, ZHU Tao, . COVID-19 X-ray Classification Based on Improved Efficientnet Network [J]. Computer and Modernization, 2023, 0(09): 94-99. |
[14] | MA Guo-xiang, YANG Ling-fei, YAN Chuan-bo, ZHANG Zhi-hao, SUN Bing, WANG Xiao-rong. Ultrasonic Image Diagnosis of Hepatic Echinococcosis Based on Deep DenseNet Network [J]. Computer and Modernization, 2023, 0(09): 100-104. |
[15] | NONG Hao-cheng, REN De-jun, REN Qiu-lin, LIU Peng-li, HUANG De-cheng. Surface Anomaly Detection Algorithm of Flexible Plastic Packaging Based on Improved ConvNeXt [J]. Computer and Modernization, 2023, 0(08): 12-17. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||