Liu et al., 2012 - Google Patents
Semi-supervised encrypted traffic classification using composite features setLiu et al., 2012
View PDF- Document ID
- 16031977951267849102
- Author
- Liu H
- Wang Z
- Wang Y
- Publication year
- Publication venue
- Journal of Networks
External Links
Snippet
Many network management tasks such as managing bandwidth budget and ensuring quality of service objectives rely on accurate classification of network traffic. But the statistical features of encrypted traffics are not stable and do not contain sufficient information for …
- 239000002131 composite material 0 title abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup or address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/22—Header parsing or analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shen et al. | Classification of encrypted traffic with second-order Markov chains and application attribute bigrams | |
Tong et al. | A novel QUIC traffic classifier based on convolutional neural networks | |
Erman et al. | Identifying and discriminating between web and peer-to-peer traffic in the network core | |
Alejandre et al. | Feature selection to detect botnets using machine learning algorithms | |
Dhote et al. | A survey on feature selection techniques for internet traffic classification | |
Liu et al. | Semi-supervised encrypted traffic classification using composite features set | |
Wang et al. | Inferring protocol state machine from network traces: a probabilistic approach | |
Singh | Performance analysis of unsupervised machine learning techniques for network traffic classification | |
US20220174008A1 (en) | System and method for identifying devices behind network address translators | |
KR101295708B1 (en) | Apparatus for capturing traffic and apparatus, system and method for analyzing traffic | |
Korczyński et al. | Classifying service flows in the encrypted skype traffic | |
Deng et al. | The random forest based detection of shadowsock's traffic | |
Li et al. | Real-time P2P traffic identification | |
Bacquet et al. | Genetic optimization and hierarchical clustering applied to encrypted traffic identification | |
Datta et al. | Network traffic classification in encrypted environment: a case study of google hangout | |
CN111953552B (en) | Data flow classification method and message forwarding equipment | |
Dong et al. | Flow cluster algorithm based on improved K-means method | |
Alizadeh et al. | Timely classification and verification of network traffic using Gaussian mixture models | |
Ma et al. | A summary of traffic identification method depended on machine learning | |
Gomez et al. | Efficient network telemetry based on traffic awareness | |
Nair et al. | Internet traffic classification by aggregating correlated decision tree classifier | |
Amina et al. | Featuring real-time imbalanced network traffic classification | |
Obasi et al. | An experimental study of different machine and deep learning techniques for classification of encrypted network traffic | |
Wang et al. | On the impact of packet inter arrival time for early stage traffic identification | |
Aafa et al. | A survey on network traffic classification techniques |