과제정보
본 연구는 한성대학교 교내학술연구비 지원과제임.
참고문헌
- N. Shah, "The challenges of inspecting encrypted network traffic," Fortinet [Internet], https://www.fortinet.com/blog/industry-trends/keeping-up-with-performance-demands-of-encrypted-web-traffic.2020.08.04.
- N. Wodecki, "Zscaler's 2021 encrypted attacks report reveals 314 percent spike in HTTPS threats," Zscaler [Internet], https://www.zscaler.com/press/zscalers-2021-encrypted-attacks-report-reveals-314-percent-spike-https-threats.2021.08.28.
- SonicWall, "2021 Cyber Threat Report: Mid-Year Update," SonicWall [Intenet], https://webobjects2.cdw.com/is/content/CDW/cdw/on-domain-cdw/brands/sonicwall/mid-year-2021-cyber-threat-report.pdf
- Z. Chen, K. He, J. Li, and Y. Geng, "Seq2Img: Sequence-to-Image based approach towards IP traffic classification using convolutional neural networks," IEEE International Conference on Big Data (BIGDATA), pp.1271-1276, 2017.
- W. Wang, M. Zhu, J. Wang, X. Zeng, and Z. Yang, "End-to-End encrypted traffic classification with one-dimensional convolution neural networks," IEEE Internationa Conference on Intelligence and Security Informatics (ISI), pp.43-48, 2017.
- M. Lotfollahi, M. J. Siavoshani, R. S. H. Zade, and M. Saberian, "Deep packet: A novel approach for encrypted traffic classification using deep learning," Soft Computing, Vol.24, No.3, pp.1999-2012, 2020. https://doi.org/10.1007/s00500-019-04030-2
- L. Vu, C. T. Bui, and Q. U. Nguyen, "A deep learning based method for handling imblanced problem in network traffic classification," International Symposium on Information and Communication Technology (SoICT), pp.333-339, 2017.
- S. Rezaei and X. Liu, "How to achieve high classification accuracy with just a few labels: A semi-supervised approach using sampled packets," arXiv e-prints, arXiv-1812, 2019.
- G. Aceto, D. Ciuonzo, A. Montieri, and A. Pescape, "Mobile encrypted traffic classification using deep learning," Network Traffic Measurement and Analysis Conference (TMA), pp.1-8, 2018.
- T. Wang and I. Goldberg, "Improved website fingerprinting on tor," ACM Workshop on Privacy in the Electronic Society (WPES), pp.201-212, 2013.
- P. Sirinam, M. Imani, M. Juarez, and M. Wright, "Deep fingerprinting: Undermining website fingerprinting defenses with deep learning," ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.1928-1943, 2018.