Mobile QR Code QR CODE

2025

Reject Ratio

81.5%

References

1 
Zhou K. , Wang W. Y. , Wu C. H. , Hu T. , 2020, Practical evaluation of encrypted traffic classification based on a combined method of entropy estimation and neural networks, ETRI Journal, Vol. 42, No. 3, pp. 311-323DOI
2 
Ma C. C. , Du X. H. , Cao L. F. , 2020, Improved KNN algorithm for fine-grained classification of encrypted network flow, Electronics, Vol. 9, No. 2DOI
3 
Belmoukadam O. , Barakat C. , 2021, Unveiling the end-user viewport resolution from encrypted video traces, IEEE Transactions on Network and Service Management, Vol. 18, No. 3, pp. 3324-3335DOI
4 
Zang X. D. , Gong J. , Wang M. L. , Gao P. , Zhang G. W. , 2023, IP traffic behavior characterization via semantic mining, Journal of Network and Computer Applications, Vol. 213, pp. 103603DOI
5 
Zeng X. M. , Chen X. S. , Shao G. L. , He T. , Han Z. H. , Wen Y. , Wang Q. X. , 2019, Flow context and host behavior based Shadowsocks's traffic identification, IEEE Access, Vol. 7, pp. 41017-41032DOI
6 
Bhardwaj S. , Dave M. , 2023, Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack, Computers & Security, Vol. 135, pp. 103521DOI
7 
Canavese D. , Regano L. , Basile C. , Ciravegna G. , Lioy A. , 2022, Encryption-agnostic classifiers of traffic originators and their application to anomaly detection, Computers & Electrical Engineering, Vol. 97DOI
8 
Papadogiannaki E. , Ioannidis S. , 2021, Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware, Sensors, Vol. 21, No. 4DOI
9 
Hao L. P. , Ma Y. H. , 2023, Spoofing traffic attack recognition algorithm for wireless communication networks in a smart city based on improved machine learning, Journal of Testing and EvaluationDOI
10 
Sarfaraz A. , Khan A. , 2018, Feature selection based correlation attack on HTTPS secure searching, Wireless Personal Communications, Vol. 103, No. 4, pp. 2995-3008DOI
11 
Liu C. , Xiong G. , Gou G. P. , Yiu S. M. , Li Z. , Tian Z. H. , 2021, Classifying encrypted traffic using adaptive fingerprints with multi-level attributes, World Wide Web-Internet and Web Information Systems, Vol. 24, No. 6, pp. 2071-2097DOI
12 
Yang L. M. , Fu S. J. , Zhang X. Y. , Guo S. Z. , Wang Y. J. , Yang C. , 2022, FlowSpectrum: A concrete characterization scheme of network traffic behavior for anomaly detection, World Wide Web-Internet and Web Information Systems, Vol. 25, No. 5, pp. 2139-2161DOI
13 
Patil P. N. , Ross K. C. , Boyles S. D. , 2021, Convergence behavior for traffic assignment characterization metrics, Transportmetrica A: Transport Science, Vol. 17, No. 4, pp. 1244-1271DOI
14 
Feng W. , Ding X. F. , 2021, A congestion attack behaviour recognition method for wireless sensor networks based on a decision tree, International Journal of Sensor Networks, Vol. 36, No. 4, pp. 236-242DOI
15 
Abideen M. Z. ul , Saleem S. , Ejaz M. , 2019, VPN traffic detection in SSL-protected channel, Security and Communication Networks, Vol. 2019DOI
16 
Bai H. W. , Liu W. W. , Liu G. J. , Dai Y. W. , Huang S. H. , 2021, Application behavior identification in DNS tunnels based on spatial-temporal information, IEEE Access, Vol. 9, pp. 80639-80653DOI
17 
Liu J. Y. , Wang L. T. , Hu W. , Gao Y. T. , Cao Y. F. , Lin B. J. , Zhang R. , 2023, Spatial-temporal feature with dual-attention mechanism for encrypted malicious traffic detection, Security and Communication Networks, Vol. 2023DOI
18 
Kattadige C. , Choi K. N. , Wijesinghe A. , Nama A. , Thilakaranthna K. , Seneviratne S. , Jourjon G. , 2021, SETA++: Real-time scalable encrypted traffic analytics in multi-Gbps networks, IEEE Transactions on Network and Service Management, Vol. 18, No. 3, pp. 3244-3259DOI
19 
Niktabe S. , Lashkari A. H. , Roudsari A. H. , 2024, Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning, Peer-to-Peer Networking and Applications, Vol. 17, No. 1, pp. 507-531DOI
20 
Zhang K. , Deng M. J. , Gong B. , Miao Y. B. , Ning J. T. , 2024, Privacy-preserving traceable encrypted traffic inspection in blockchain-based industrial IoT, IEEE Internet of Things Journal, Vol. 11, No. 2, pp. 3484-3496DOI
21 
Abu Al-Haija Q. , Al-Badawi A. , 2022, Attack-aware IoT network traffic routing leveraging ensemble learning, Sensors, Vol. 22, No. 1DOI
22 
Zheng X. C. , Li H. , 2023, Identification of malicious encrypted traffic through feature fusion, IEEE Access, Vol. 11, pp. 80072-80080DOI
23 
dos Santos B. V. , Vergütz A. , Macedo R. T. , Nogueira M. , 2023, A dynamic method to protect user privacy against traffic-based attacks on smart home, Ad Hoc Networks, Vol. 149DOI
24 
Caicedo-Muñoz J. A. , Espino A. L. , Corrales J. C. , Rendón A. , 2018, QoS-classifier for VPN and non-VPN traffic based on time-related features, Computer Networks, Vol. 144, pp. 271-279DOI
25 
Zhang X. Q. , Zhao M. , Wang J. Y. , Li S. , Zhou Y. , Zhu S. N. , 2022, Deep-forest-based encrypted malicious traffic detection, Electronics, Vol. 11, No. 7DOI
26 
Yang J. , Lim H. , 2021, Deep learning approach for detecting malicious activities over encrypted secure channels, IEEE Access, Vol. 9, pp. 39229-39244DOI
27 
Hong Y. P. , Li Q. , Yang Y. Q. , Shen M. , 2023, Graph-based encrypted malicious traffic detection with hybrid analysis of multi-view features, Information Sciences, Vol. 644DOI
28 
Lin P. , Ye K. J. , Hu Y. S. , Lin Y. Y. , Xu C. Z. , 2023, A novel multimodal deep learning framework for encrypted traffic classification, IEEE/ACM Transactions on Networking, Vol. 31, No. 3, pp. 1369-1384DOI
29 
Bader O. , Lichy A. , Dvir A. , Dubin R. , Hajaj C. , 2024, OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification, Computer Communications, Vol. 213, pp. 271-284DOI
30 
Kato H. , Haruta S. , Sasase I. , 2020, Android malware detection scheme based on level of SSL server certificate, IEICE Transactions on Information and Systems, Vol. E103-D, No. 2, pp. 379-389DOI
31 
Bhati B. S. , Rai C. S. , 2020, Analysis of support vector machine-based intrusion detection techniques, Arabian Journal for Science and Engineering, Vol. 45, No. 4, pp. 2371-2383DOI
32 
Bhati B. S. , Dikshita , Bhati N. S. , Chugh G. , 2022, A comprehensive study of intrusion detection and prevention systems, Wireless Communication Security, pp. 115-142DOI