Liu et al., 2012 - Google Patents
Semi-supervised encrypted traffic classification using composite features setLiu et al., 2012
View PDF- Document ID
- 16031977951267849102
- Author
- Liu H
- Wang Z
- Wang Y
- Publication year
- Publication venue
- Journal of Networks
External Links
Snippet
Many network management tasks such as managing bandwidth budget and ensuring quality of service objectives rely on accurate classification of network traffic. But the statistical features of encrypted traffics are not stable and do not contain sufficient information for …
- 239000002131 composite material 0 title abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup or address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/22—Header parsing or analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shen et al. | Classification of encrypted traffic with second-order Markov chains and application attribute bigrams | |
Erman et al. | Identifying and discriminating between web and peer-to-peer traffic in the network core | |
Alejandre et al. | Feature selection to detect botnets using machine learning algorithms | |
Dhote et al. | A survey on feature selection techniques for internet traffic classification | |
Liu et al. | Semi-supervised encrypted traffic classification using composite features set | |
Wang et al. | Inferring protocol state machine from network traces: a probabilistic approach | |
US20220174008A1 (en) | System and method for identifying devices behind network address translators | |
Korczyński et al. | Classifying service flows in the encrypted skype traffic | |
Deng et al. | The random forest based detection of shadowsock's traffic | |
Li et al. | Real-time P2P traffic identification | |
Datta et al. | Network traffic classification in encrypted environment: a case study of google hangout | |
CN111953552B (en) | Data flow classification method and message forwarding equipment | |
Barut et al. | TLS encrypted application classification using machine learning with flow feature engineering | |
Dong et al. | Flow cluster algorithm based on improved K-means method | |
Alizadeh et al. | Timely classification and verification of network traffic using Gaussian mixture models | |
Ma et al. | A summary of traffic identification method depended on machine learning | |
Pereira et al. | ITCM: A real time internet traffic classifier monitor | |
Wang et al. | On the impact of packet inter arrival time for early stage traffic identification | |
Gomez et al. | Efficient network telemetry based on traffic awareness | |
Obasi et al. | An experimental study of different machine and deep learning techniques for classification of encrypted network traffic | |
CN114866301A (en) | Method and system for identifying and classifying encrypted traffic based on direct push graph | |
Kadi et al. | Machine learning for QUIC traffic flood detection | |
Zarei et al. | Automated dataset generation for training peer-to-peer machine learning classifiers | |
Aafa et al. | A survey on network traffic classification techniques | |
Ramraj et al. | Unsupervised feature learning for whatsapp network data packets using autoencoder |