Acknowledgement
이 논문은 과학기술정보통신부의 재원으로 정보통신기획평가원(No. 2020-0-01840, 스마트폰의 내부데이터 접근 및 보호 기술 분석)과 한국연구재단(No. NRF-2022R1A4A1032361, Processing-in-Memory 보안 기술 개발)의 지원을 받아 수행된 연구임
References
- Velan, P., Cermak, M., Celeda, P., & Drasar, M. (2015). A survey of methods for encrypted traffic classification and analysis. International Journal of Network Management, 25(5), 355-374.
- IANA port number list, Available: http://www.iana.org/assignments/service-names-prt-numbers/service-names-port-numbers.xml
- Islam, F. U., Liu, G., Zhai, J., & Liu, W. (2021). VoIP traffic detection in tunneled and anonymous networks using deep learning. IEEE Access, 9, 59783-59799. https://doi.org/10.1109/ACCESS.2021.3073967
- Islam, F. U., Liu, G., Zhai, J., & Liu, W. (2021). VoIP traffic detection in tunneled and anonymous networks using deep learning. IEEE Access, 9, 59783-59799. https://doi.org/10.1109/ACCESS.2021.3073967
- The best online VPN service for speed | NordVPN. (2024, April 9). NordVPN. https://nordvpn.com/
- VPN Gate - Public Free VPN Cloud by Univ of Tsukuba, Japan. (n.d.). https://www.vpngate.net/
- Lashkari, A. H., Gil, G. D., Mamun, M. S. I., & Ghorbani, A. A. (2017, February). Characterization of tor traffic using time based features. In International Conference on Information Systems Security and Privacy (Vol. 2, pp. 253-262). SciTePress.