메뉴 건너뛰기




Volumn 7, Issue 8, 2012, Pages 1195-1200

Semi-supervised encrypted traffic classification using composite features set

Author keywords

Composite feature set; Encrypted traffic; Semi supervised learning; Traffic classification

Indexed keywords

COMPOSITE FEATURES; ENCRYPTED TRAFFIC; NETWORK TRAFFIC; SEMI-SUPERVISED; SEMI-SUPERVISED LEARNING; STATISTICAL FEATURES; TRAFFIC CLASSIFICATION;

EID: 84866031578     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.7.8.1195-1200     Document Type: Article
Times cited : (21)

References (17)
  • 2
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • T.T.T. Nguyen and G.J. Armitage, "A survey of techniques for internet traffic classification using machine learning", in IEEE Communications Surveys and Tutorials, 2008, pp.56-76
    • (2008) IEEE Communications Surveys and Tutorials , pp. 56-76
    • Nguyen, T.T.T.1    Armitage, G.J.2
  • 3
    • 84866009571 scopus 로고    scopus 로고
    • Xunlei
    • Xunlei, http://www.xunlei.com, 2011
    • (2011)
  • 6
    • 80053983786 scopus 로고    scopus 로고
    • A longitudinal study of P2P traffic classification
    • Analysis, and Simulation of Computer and elecommunication Systems, September
    • A. Madhukar and C. Williamson, "A longitudinal study of P2P traffic classification," in 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and elecommunication Systems, September 2006.
    • (2006) 14th IEEE International Symposium on Modeling
    • Madhukar, A.1    Williamson, C.2
  • 7
    • 19944406146 scopus 로고    scopus 로고
    • Accurate, scalable in-network identification of p2p traffic using application signatures
    • S. Sen, O. Spatscheck, and D. Wang, "Accurate, scalable in-network identification of p2p traffic using application signatures", in Proc. WWW, 2004, pp.512-521.
    • (2004) Proc. WWW , pp. 512-521
    • Sen, S.1    Spatscheck, O.2    Wang, D.3
  • 11
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network traffic
    • presented at
    • C.V. Wright, F. Monrose, and G.M. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", presented at Journal of Machine Learning Research, 2006, pp.2745-2769.
    • (2006) Journal of Machine Learning Research , pp. 2745-2769
    • Wright, C.V.1    Monrose, F.2    Masson, G.M.3
  • 12
    • 77954758321 scopus 로고    scopus 로고
    • An SVM-based machine learning method for accurate internet traffic classification
    • R. Yuan, Z. Li, X. Guan, and L. Xu, "An SVM-based machine learning method for accurate internet traffic classification", in Information Systems Frontiers, 2010, pp.149-156.
    • (2010) Information Systems Frontiers , pp. 149-156
    • Yuan, R.1    Li, Z.2    Guan, X.3    Xu, L.4
  • 14
    • 79551620659 scopus 로고    scopus 로고
    • An novel composite method for effectively classifying encrypted traffic
    • G. Sun, Y. Xue, Y. Dong, D. Wang, and C. Li, "An Novel Composite Method for Effectively Classifying Encrypted Traffic", in Proc. GLOBECOM, 2010, pp.1-5.
    • (2010) Proc. GLOBECOM , pp. 1-5
    • Sun, G.1    Xue, Y.2    Dong, Y.3    Wang, D.4    Li, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.