메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Machine learning based encrypted traffic classification: Identifying SSH and Skype

Author keywords

[No Author keywords available]

Indexed keywords

ADABOOST; BAYESIAN; ENCRYPTED TRAFFIC; FLOW BASED; IP ADDRESSS; MACHINE-LEARNING; OTHER ALGORITHMS; PAYLOAD INFORMATION; TRAFFIC CLASSIFICATION;

EID: 77950563729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISDA.2009.5356534     Document Type: Conference Paper
Times cited : (165)

References (35)
  • 3
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • Moore A. W., Zuev D., "Internet Traffic Classification Using Bayesian Analysis Techniques", Proceedings of the ACM SIGMETRICS, pp 50-60, 2005.
    • (2005) Proceedings of the ACM SIGMETRICS , pp. 50-60
    • Moore, A.W.1    Zuev, D.2
  • 5
    • 33750283653 scopus 로고    scopus 로고
    • A prelimenary performance comparison of five machine learning algorithms for practical ip traffic flow comparison
    • Williams N., Zander S., Armitage G., "A Prelimenary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Comparison", ACM SIGCOMM Computer Communication Review, Vol. 36, No. 5, pp. 5-16, 2006.
    • (2006) ACM SIGCOMM Computer Communication Review , vol.36 , Issue.5 , pp. 5-16
    • Williams, N.1    Zander, S.2    Armitage, G.3
  • 10
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network traffic
    • Wright C. V., Monrose F., Masson G. M., "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", Journal of Machine Learning Research, (7), pp. 2745-2769, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2745-2769
    • Wright, C.V.1    Monrose, F.2    Masson, G.M.3
  • 13
    • 77950591051 scopus 로고    scopus 로고
    • NLANR, http://pma.nlanr.net/Special.
    • NLANR
  • 14
    • 77950557595 scopus 로고    scopus 로고
    • MAWI, http://tracer.csl.sony.co.jp/MAWI/.
    • MAWI
  • 15
    • 0003993827 scopus 로고    scopus 로고
    • last accessed Jan. 2008
    • 1999 DARPA intrusion detection evaluation data, http://www.ll.mit.edu/ IST/ideval/docs/1999schedule.html last accessed Jan. 2008.
    • (1999) DARPA Intrusion Detection Evaluation Data
  • 18
    • 84872200387 scopus 로고    scopus 로고
    • PacketShaper, http://www.packeteer.com/products/packetshaper/.
    • PacketShaper
  • 19
    • 77950551765 scopus 로고    scopus 로고
    • l7-filter, http://l7-filter.sourceforge.net/.
    • L7-filter
  • 20
    • 77950550836 scopus 로고    scopus 로고
    • NetMate, http://www.ip-measurement.org/tools/netmate/.
    • NetMate
  • 21
    • 77950573126 scopus 로고    scopus 로고
    • IETF, http://www3.ietf.org/proceedings/97apr/97apr-final/xrtftr70.htm.
    • IETF
  • 22
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Burges C. J. C., "A Tutorial on Support Vector Machines for Pattern Recognition", Data Mining and Knowledge Discovery, 2(2): 1-47, 1998.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 1-47
    • Burges, C.J.C.1
  • 28
    • 84876764406 scopus 로고    scopus 로고
    • WEKA Software, http://www.cs.waikato.ac.nz/ml/weka/.
    • WEKA Software


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.