1 |
McGaughey D, Semeniuk D, Smith R, "A systematic approach of feature selection for encrypted network traffic classification," in Proc. of the 2018 Annual IEEE International Systems Conference, Piscataway, NJ: IEEE, pp. 1- 8, 2018.
|
2 |
Sarkar A, Dasgupta S, Naskar S K, "Says Who? Deep Learning Models for Joint Speech Recognition, Segmentation and Diarization," in Proc. of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, pp. 5229-5233, 2018.
|
3 |
Lopez-Martin M, Carro B, Sanchez-Esguevillas A, "Network Traffic Classifier with Convolutional and Recurrent Neural Networks for Internet of Things," IEEE Access, vol. 5, pp. 18042-18050, 2017.
DOI
|
4 |
Ducange P, Mannara G, Marcelloni F, "A novel approach for internet traffic classification based on multi-objective evolutionary fuzzy classifiers," in Proc. of 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, pp. 1-6, 2017.
|
5 |
Shone N, Ngoc T N, Phai V D, "A deep learning approach to network intrusion detection," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no.1, pp. 41-50, 2018.
DOI
|
6 |
Wu K, Chen Z, Li W, "A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks," IEEE Access, vol. 6, pp. 50850-50859, 2018.
DOI
|
7 |
Adie H T R, Pradana I A, "Parallel Computing Accelerated Image Inpainting using GPU CUDA, Theano and Tensorflow," in Proc. of 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE), Kuta, pp. 621-625, 2018.
|
8 |
Ge Y F, Peng F , Feng X X, "Homology Analysis of Malicious Code Based on Dynamic BP Neural Network," Journal of Chinese Computer Systems, vol. 37, no. 11,pp. 2527-2531, 2016.
|
9 |
Perera P, Tian Y C, Fidge C, "A comparison of supervised machine learning algorithms for classification of communications network traffic," in Proc. of International Conference on Neural Information Processing. Springer, Cham, pp. 445-454, 2017.
|
10 |
Zhang L , Cui Y, "Application of Machine Learning in Cyberspace Security Research," Chinese Journal of Computers, vol. 41, no 9, pp. 1943-1975, 2018.
|
11 |
HE H, "A network traffic classification method using support vector machine with feature weighted-degree," Journal of Digital Information Management, vol. 15, no. 5, pp. 76-83, 2017.
|
12 |
Moore A W, Zuev D, "Internet traffic classification using Bayesian analysis techniques," ACM SIGMETRICS Performance Evaluation Review, vol. 33, no. 1, 2005.
|
13 |
Wang W, "HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection," IEEE Access, vol. 6, pp. 1792-1806, 2018.
DOI
|
14 |
KONG L, HUANG G, WU K, "Identification of abnormal network traffic using support vector machine," in Proc. of the 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, Piscataway, NJ: IEEE, pp. 288-292, 2017.
|
15 |
Song L, Chang L, "Application of mutation particle swarm optimization BP neural network in malicious code detection," Journal of Intelligent Systems, vol. 8, no. 6, pp. 558-563, 2013.
|
16 |
Wang R, Feng D G, "Feature extraction and detection method of malicious code based on semantics," Journal of Software, vol. 23, no. 2, pp. 378-393, 2012.
DOI
|
17 |
Vu L, Bui C T, Nguyen Q U, "A deep learning based method for handling imbalanced problem in network traffic classification," in Proc. of the Eighth International Symposium on Information and Communication Technology, ACM, pp. 333-339, 2017.
|
18 |
Rao Z, Niu W, Zhang X S, "Tor anonymous traffic identification based on gravitational clustering," Peer-to-Peer Networking and Applications, vol. 11, pp. 592-601, 2018.
DOI
|
19 |
Velan P, Cermak M, Celeda P, "A survey of methods for encrypted traffic classification and analysis," International Journal of Network Management, vol. 25, no.5, pp. 355-374, 2015.
DOI
|
20 |
Deng Z, Qian G, Chen Z, "Identifying Tor Anonymous Traffic Based on Gravitational Clustering Analysis," in Proc. of International Conference on Intelligent Human-Machine Systems and Cybernetics, IEEE, pp. 79-83, 2017.
|
21 |
Carela-Espanol V, Barlet-Ros P, Mula-Valls O, "An autonomic traffic classification system for network operation and management," Journal of Network and Systems Management, vol. 23, no. 3, pp. 401-419, 2015.
DOI
|
22 |
Liu J, Zheng C, Guo L, "Understanding the Network Traffic Constraints for Deep Packet Inspection by Passive Measurement," in Proc. of 2018 3rd International Conference on Information Systems Engineering (ICISE), IEEE, pp. 26-32, 2018.
|
23 |
Ho T L, Cho S J, Oh S R, "Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units," IET Information Security, vol. 12, no. 4, pp. 381-388, 2018.
DOI
|
24 |
Zhang J, Chen X, Xiang Y, "Robust network traffic classification," IEEE/ACM Transactions on Networking (TON), vol. 23, no. 4, pp. 1257-1270, 2015.
DOI
|
25 |
China Internet Network Information Center, "Internet usage," Statistical Report on the Development of Internet in China, pp. 17-18, February 2019.
|
26 |
Aceto G, Ciuonzo D, Montieri A, "Mobile encrypted traffic classification using deep learning," in Proc. of 2018 Network Traffic Measurement and Analysis Conference (TMA), pp. 1-8, 2018.
|
27 |
Wang W, Zhu M, Zeng X, "Malware traffic classification using convolutional neural network for representation learning," in Proc. of 2017 International Conference on Information Networking (ICOIN), pp. 712-717, 2017.
|
28 |
Sun G, Liang L, Chen T, Xiao F, Fang L, "Network traffic classification based on transfer learning," Computers & electrical engineering, vol. 69, pp. 920-927, 2018.
DOI
|
29 |
Moore A W, Zuev D, "Discriminators for use in Flow-based classification," Technical Report IRC-TR-04-028, Intel Research, Cambridge, 2005.
|
30 |
He G, Yang M, Luo J, "A novel application classification attack against Tor," Concurrency and Computation: Practice and Experience, vol. 27, no.18, pp. 5640-5661, 2015.
DOI
|
31 |
Deshpande P, Sharma S C, Peddoju S K, "HIDS: A host based intrusion detection system for cloud computing environment," International Journal of System Assurance Engineering and Management, vol. 9, no. 3, pp. 567-576, 2018.
DOI
|
32 |
Araujo I M, Natalino C, Santana A L, "Accelerating VNF-based Deep Packet Inspection with the use of GPUs," in Proc. of 2018 20th International Conference on Transparent Optical Networks (ICTON), IEEE, pp. 1-4, 2018.
|
33 |
Sivaprasad A, Ghawalkar N, Hodge S, "Machine learning based traffic classification using statistical analysis," Int. J. Recent Innov. Trends Comput. Commun., vol. 6, no. 3, pp. 187-191, 2018.
|
34 |
Krizhevsky A, Sutskever I, Hinton G E, "ImageNet classification with deep convolutional neural networks," in Proc. of International Conference on Neural Information Processing Systems, Curran Associates Inc., pp. 1097-1105, 2012.
|
35 |
LeCun Y, Bengio Y, Hinton G, "Deep learning," Nature, no. 521, pp. 436-444, 2015.
|
36 |
Tongaonkar A, Torres R, Iliofotou M, "Towards self-adaptive network traffic classification," Computer Communications, vol. 56, pp. 35-46, 2015.
DOI
|
37 |
Amaral P, Dinis J, Pinto P, "Machine learning in software defined networks: Data collection and traffic classification," in Proc. of 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, pp. 1-5, 2016.
|
38 |
Ertam F, Avci E, "A new approach for internet traffic classification: GA-WK-ELM," Measurement, vol. 95, pp.135-142, 2017.
DOI
|
39 |
Zhu Z, Liang D, Zhang S, "Traffic-sign detection and classification in the wild," in Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2110-2118, 2016.
|
40 |
Aceto G, Ciuonzo D, Montieri A, "Traffic classification of mobile apps through multi-classification," in Proc. of GLOBECOM 2017-2017 IEEE Global Communications Conference, IEEE, pp. 1-6, 2017.
|
41 |
Ran J, Chen Y, Li S, "Three-dimensional Convolutional Neural Network based Traffic Classification for Wireless Communications," in Proc. of 2018 IEEE Global Conference on Signal and Information Processing (Global SIP), Anaheim, CA, USA, pp. 624-627, 2018.
|
42 |
Dong Y, Zhao J, Jin J, "Novel feature selection and classification of Internet video traffic based on a hierarchical scheme," Computer Networks, vol. 119, pp. 102-111, 2017.
DOI
|
43 |
Avci O, Abdeljaber O, Kiranyaz S, "Structural damage detection in real time: implementation of 1D convolutional neural networks for SHM applications," Structural Health Monitoring & Damage Detection, Springer, Cham, vol. 7, pp. 49-54, 2017.
|
44 |
Ran J, Kong X C, "A Self-adaptive Traffic Classification System with Unknown Flow Detection," in Proc. of 3rd IEEE International Conference on Computer and Communications, IEEE, pp. 1215-1220, 2017.
|
45 |
Hochst J, Baumgartner L, Hollick M, "Unsupervised traffic flow classification using a neural autoencoder," in Proc. of 2017 IEEE 42nd Conference on Local Computer Networks (LCN), IEEE, pp. 523-526, 2017.
|
46 |
Zou Z, Ge J, Zheng H, "Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network," in Proc. of 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE, pp. 329-334, 2018.
|
47 |
Hinton G E, Salakhutdinov R R, "Reducing the dimensionality of data with neural networks," science, vol. 313, no. 5786, pp. 504-507, 2006.
DOI
|
48 |
Shao H, Tang L, Dong L, "A Research of Network Applications Classification Based on Deep Learning," in Proc. of International Conference on Machine Learning and Intelligent Communications. Springer, Cham, pp. 13-21, 2018.
|
49 |
Stevanovic M, Pedersen J M, "An analysis of network traffic classification for botnet detection," in Proc. of 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp. 1-8, 2015.
|
50 |
Gomez S E, Martinez B C, Sanchez-Esguevillas A J, "Ensemble network traffic classification: Algorithm comparison and novel ensemble scheme proposal," Computer Networks, vol. 127, pp. 68-80, 2017.
DOI
|
51 |
Karim F, Majumdar S, Darabi H, "Multivariate lstm-fcns for time series classification," Neural Networks, vol. 116, pp. 237-245, 2019.
DOI
|
52 |
Kim T Y, Cho S B, "Web traffic anomaly detection using C-LSTM neural networks," Expert Systems with Applications, vol. 106, pp. 66-76, 2018.
DOI
|
53 |
Taheri R, Javidan R, Shojafar M, "On Defending Against Label Flipping Attacks on Malware Detection Systems," Neural Computing and Applications, vol. 32, pp. 14781-14800, 2020.
DOI
|