[1] KORCZY'NSKI M, DUDA A. Markov chain fingerprinting to classify encrypted traffic. Proceedings of the 2014 IEEE Conference on Computer Communications (INFOCOM'14), 2014, Apr 27 - May 2, Toronto, Canada. Piscataway, NJ, USA: IEEE, 2014: 781 -789.
[2] LI C X, GUO Y, WANG X. Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes. High- Confidence Computing, 2022, 2(1): Article 100033.
[3] NING J T, POH G S, LOH J C, et al. PrivDPI: privacy- preserving encrypted traffic inspection with reusable obfuscated rules. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ( CCS'19), 2019, Nov 11 - 15, London, UK. New York, NY, USA: ACM, 2019: 1657 -1670.
[4] SHEKHAWAT A S, DI TROIA F, STAMP M. Feature analysis of encrypted malicious traffic. Expert Systems with Applications, 2019, 125: 130 -141.
[5] WANG W, ZHU M, WANG J L, et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI'17), 2017, Jul 22 - 24, Beijing, China. Piscataway, NJ, USA: IEEE, 2017: 43 - 48.
[6] RIMMER V, PREUVENEERS D, JUAREZ M, et al. Automated website fingerprinting through deep learning. Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS'18 ), 2018, Feb 18 - 21, San Diego, CA, USA. Reston, VA, USA: The Internet Society, 2018: 1 -15.
[7] ZENG Y, GU H X, WEI W T, et al. Deep-full-range: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access, 2019, 7: 45182 -45190.
[8] BU Z Y, ZHOU B, CHENG P Y, et al. Encrypted network traffic classification using deep and parallel network-in-network models. IEEE Access, 2020, 8: 132950 -132959.
[9] LOTFOLLAHI M, SIAVOSHANI M J, ZADE R S H, et al. Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Computing, 2020, 24(3): 1999 -2012.
[10] LIN K D, XU X L, GAO H H. TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Computer Networks, 2021, 190: Article 107974.
[11] DRAPER-GIL G, LASHKARI A H, MAMUN M S I, et al. Characterization of encrypted and VPN traffic using time-related features. Proceedings of the 2nd International Conference on Information Systems Security and Privacy ( ICISSP'16), 2016, Feb 19 - 21, Rome, Italy. Berlin, Germany: Springer, 2016: 407 -414.
|