Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (1): 32-41.doi: 10.11959/j.issn.2096-109x.2023007
• Papers • Previous Articles Next Articles
Guozhen SHI1, Kunyang LI1, Yao LIU2, Yongjian YANG1
Revised:
2022-12-04
Online:
2023-02-25
Published:
2023-02-01
Supported by:
CLC Number:
Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG. Encrypted traffic identification method based on deep residual capsule network with attention mechanism[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 32-41.
[1] | AHMED M , MAHMOOD A N , HU J . A survey of network anomaly detection techniques[J]. Journal of Network & Computer Applications, 2016,60: 19-31. |
[2] | DAINOTTI A , PESCAPE A , CLAFFY K C . Issues and future directions in traffic classification[J]. IEEE Network, 2012,26(1): 35-40. |
[3] | LUFT S J , CHIANG P . Network element architecture for deep packet inspection:US,US7719966 B2[P]. 2010. |
[4] | ESTE A , GRINGOLI F , SALGARELLI L . Support vector machines for TCP traffic classification[J]. Computer Networks, 2009,53(14): 2476-2490. |
[5] | KHONDOKE R , RAHAMATULLAH M . Interactive traffic class prioritization and radio link condition diversification techniques for efficient utilization of MMS and WAP services[J]. Chemical Communications, 2012,48(98): 11960-11962. |
[6] | QIU C , XU H , BAO Y . Modified-DBSCAN clustering for identifying traffic accident prone locations[C]// International Conference on Intelligent Data Engineering and Automated Learning. 2016: 99-105. |
[7] | WEI W , MING Z , WANG J ,et al. End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]// 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 2017. |
[8] | SHAPIRA T , SHAVITT Y . FlowPic:encrypted internet traffic classification is as easy as image recognition[C]// IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops. 2019. |
[9] | REN X , GU H , WEI W . Tree-RNN:tree structural recurrent neural network for network traffic classification[J]. Expert Systems with Applications, 2021,167(1): 114363. |
[10] | XIAO X , XIAO W , LI R ,et al. EBSNN:extended byte segment neural network for network traffic classification[J]. IEEE Transactions on Dependable and Secure Computing, 2021(1). |
[11] | YAO H , LIU C , ZHANG P ,et al. Identification of encrypted traffic through attention mechanism based long short term memory[J]. IEEE Trans Big Data, 2022,8(1): 241-252. |
[12] | ZOU Z , GE J , ZHENG H ,et al. Encrypted traffic classification with a convolutional long short-term memory neural network[C]// 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City,IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). 2018: 329-334. |
[13] | SABOUR S , FROSST N , HINTON G E . Dynamic routing between capsules[C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. 2017: 3859-3869. |
[14] | RAJASEGARAN J , JAYASUNDARA V , JAYASEKARA S ,et al. Deepcaps:going deeper with capsule networks[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2019: 10725-10733. |
[15] | VENKATARAMAN S R , BALASUBRAMANIAN S , SARMA R R . Building deep equivariant capsule networks[C]// International Conference on Learning Representations. 2019. |
[16] | SRIVASTAVA R K , GREFF K , SCHMIDHUBER J . Training very deep networks[C]// Proceedings of the 28th International Conference on Neural Information Processing Systems-Volume 2. 2015: 2377-2385. |
[17] | 骆子铭, 许书彬, 刘晓东 . 基于机器学习的 TLS 恶意加密流量检测方案[J]. 网络与信息安全学报, 2020,6(1): 77-83. |
LUO Z M , XU S B , LIU X D . Scheme for identifying malware traffic with TLS data based on machine learning[J]. Chinese Journal of Network and Information Security, 2020,6(1): 77-83. | |
[18] | 翟明芳, 张兴明, 赵博 . 基于深度学习的加密恶意流量检测研究[J]. 网络与信息安全学报, 2020,6(3): 66-77. |
ZHAI M F , ZHANG X M , ZHAO B . Survey of encrypted malicious traffic detection based on deep learning[J]. Chinese Journal of Network and Information Security, 2020,6(3): 66-77. | |
[19] | HU J , SHEN L , SUN G . Squeeze-and-excitation networks[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018: 7132-7141. |
[20] | TRAN D , BOURDEV L , FERGUS R ,et al. Learning spatiotemporal features with 3d convolutional networks[C]// Proceedings of the IEEE International Conference on Computer Vision. 2015: 4489-4497. |
[21] | HE K , ZHANG X , REN S ,et al. Deep residual learning for image recognition[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016: 770-778. |
[22] | DRAPER-GIL G , LASHKARI A H , MAMUN M S I ,et al. Characterization of encrypted and VPN traffic using time-related[C]// Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP). 2016: 407-414. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|