Journal on Communications ›› 2016, Vol. 37 ›› Issue (9): 154-167.doi: 10.11959/j.issn.1000-436x.2016187

• Comprehensive Reviews • Previous Articles     Next Articles

Review and perspective on encrypted traffic identification research

Wu-bin PAN1,2,Guang CHENG1,2,Xiao-jun GUO1,2,Shun-xiang HUANG1,2   

  1. 1 School of Computer Science and Engineering,Southeast University,Nanjing 210096,China
    2 Key Laboratory of Computer Network and Information Integration of Ministry of Education,Southeast University,Nanjing 210096,China
  • Online:2016-09-25 Published:2016-09-28
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The Prospective Research Programs Future Internet of Jiangsu Province;The Six Talent Peaks of High Level Talents Project of Jiangsu Province

Abstract:

Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification technology was summarized,and identification technology was compared from multiple views.Third,the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced,such as tunneling,traffic camouflage technology,new protocols of HTTP/2.0 and QUIC.Finally,prospect trends and directions of future research on encrypted traffic identification were discussed.

Key words: encrypted traffic identification, network management, traffic engineering, traffic camouflaging, HTTP/2.0

No Suggested Reading articles found!