[1] |
The 44th China statistical report on Internet development[EB/OL].[2019-08-31].http:∥www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201908/P020190830356787490958.pdf.
|
[2] |
Janbeglou M, Brownlee N. Identifying tunnelled proxies through passively monitoring network traffic[C]∥Proc of 2016 IEEE 18th International Conference on High Performance Computing and Communications;IEEE 14th International Conference on Smart City;IEEE 2nd International Conference on Data Science and Systems,2016:63-69.
|
[3] |
Miller S, Curran K, Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]∥Proc of International Conference on Cyber Situational Awareness,Data Analytics and Assessment,2018:1-8.
|
[4] |
Deng Z Y, Liu Z H,Chen Z G,et al.The random forest based detection of Shadowsocks traffic[C]∥Proc of 2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics,2017:75-78.
|
[5] |
Zeng X M, Chen X S, Shao G L,et al.Flow context and host behavior based Shadowsocks’s traffic identification[J].IEEE Access,2019,7:41017-41032.
|
[6] |
Cheng J X, Li Y, Huang C, et al.ACER:Detecting Shadowsocks server based on active probe technology[J].Journal of Computer Virology and Hacking Techniques,2020,16:217-227.
|
[7] |
Tang Shu-ye, Cheng Guang,Jiang Bo-miao,et al.Detection and recognition of VPN encrypted traffic based on segmented entropy distribution[J].Information Security and Technology,2020,11(8):23-27.(in Chinese)
|
[8] |
Draper-Gil G,Lashkari A H,Mamun M S I,et al.Characterization of encrypted and VPN traffic using time-related features[C]∥Proc of the International Conference on Information Systems Security and Privacy,2016:94-98.
|
[9] |
Chen Y G, Zang T N,Zhang Y Z,et al.Rethinking encrypted traffic classification:A multi-attribute associated fingerprint approach[C]∥Proc of IEEE 27th International Conference on Network Protocols,2019:1-11.
|
[10] |
Sengupta S,Ganguly N, De P, et al.Exploiting diversity in Android TLS implementations for mobile app traffic classification[C]∥Proc of the World Wide Web Conference,2019:1657-1668.
|
[11] |
Lotfollahi M, Siavoshani M J, Zade R S H,et al.Deep packet:A novel approach for encrypted traffic classification using deep learning[J].Soft Computing,2020,24:1999-2012.
|
[12] |
Guo L L, Wu Q Q, Liu S L,et al.Deep learning-based real-time VPN encrypted traffic identification methods[J].Journal of Real-Time Image Processing,2020,17:103-114.
|
[13] |
Cui S S, Jiang B, Cai Z Z, et al.A session-packets-based encrypted traffic classification using capsule neural networks[C]∥Proc of 2019 IEEE 21st International Conference on High Performance Computing and Communications;IEEE 17th International Conference on Smart City;IEEE 5th International Conference on Data Science and Systems,2019:429-436.
|
[14] |
Bagui S,Fang X G,Kalaimannan E,et al.Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features[J].Journal of Cyber Security Technology,2017,1(2):108-126.
|
[15] |
Casino F,Choo K-K R, Patsakis C. HEDGE:Efficient traffic classification of encrypted and compressed packets[J].IEEE Transactions on Information Forensics and Security,2019,14(11):2916-2926.
|
[16] |
Zou Z, Ge J G, Zheng H B,et al.Encrypted traffic classification with a convolutional long short-term memory neural network[C]∥Proc of IEEE 20th International Conference on High Performance Computing and Communications;IEEE 16th International Conference on Smart City;IEEE 4th International Conference on Data Science and Systems,2018:329-334.
|
[17] |
Dong C, Zhang C, Lu Z G,et al.CETAnalytics:Comprehensive effective traffic information analytics for encrypted traffic classification[J].Computer Networks,2020,176:107258.
|
[18] |
Clowwindy M,Max L.Shadowsocks:A secure socks5 proxy,designed to protect your Internet traffic [EB/OL].[2020-06-30].http:∥www.shadowsocks.org/.
|
[19] |
Vincent F T,Riccardo S,Mauro C,et al.Robust smartphone app identification via encrypted network traffic analysis[J].IEEE Transactions on Information Forensics and Security,2017,13(1):63-78.
|
[20] |
Chen T Q,Carlos G.XGBoost:A scalable tree boosting system[EB/OL].[2016-03-09].https:∥arXiv.org/abs/1603.02754.
|
[21] |
Foroushani V A, Zincir-Heywood A N.A proxy identifier based on patterns in traffic flows[C]∥Proc of IEEE 16th International Symposium on High Assurance Systems Engineering,2015:118-125.
|
[22] |
Wang Z X, Wang P, Zhou X K,et al.FLOWGAN:Unbalanced network encrypted traffic identification method based on GAN[C]∥Proc of IEEE International Conference on Parallel and Distributed Processing with Applications,Big Data and Cloud Computing,Sustainable Computing and Communications,Social Computing and Networking,2019:975-983.
|
[23] |
Vu L, Thuy H V, Nguyen Q U,et al.Time series analysis for encrypted traffic classification:A deep learning approach[C]∥Proc of 2018 28th International Symposium on Communications and Information Technologies,2018:121-126.
|
[24] |
Wang Lin, Feng Hua-min,Liu Biao,et al.SSL VPN encrypted traffic identification based on hybrid method[J].Computer Applications and Software,2019,36(2):315-322.(in Chinese)
|
[25] |
Aceto G, Ciuonzo D, Montieri A, et al.Multi-classification approaches for classifying mobile app traffic[J].Journal of Network and Computer Applications,2018,103:131-145.
|
[26] |
Wireshark [EB/OL].[2020-07-01].https:∥www.wireshark.org/.
|
[27] |
scikit-learn:Machine learning in Python[EB/OL].[2020-07-01].http:∥scikit-learn.org/stable/.
|
[28] |
V2Ray [EB/OL].[2020-12-10].https:∥github.com/v2ray/v2ray-core/releases/.
|
|
附中文参考文献:
|
[7] |
唐舒烨,程光,蒋泊淼,等.基于分段熵分布的VPN加密流量检测与识别方法[J].网络空间安全,2020,11(8):23-27.
|
[24] |
王琳,封化民,刘飚,等.基于混合方法的SSL VPN加密流量识别研究[J].计算机应用与软件,2019,36(2):315-322.
|