[10] |
MARí G , CAASAS P , CAPDEHOURAT G . DeepMAL - deep learning models for malware traffic detection and classification[C]// Data Science – Analytics and Applications. Wiesbaden:Springer Vieweg, 2021: 105-112.
|
[11] |
REIS B , MAIA E , PRA?A I . Selection and performance analysis of CICIDS2017 features importance[C]// International Symposium on Foundations and Practice of Security. Cham:Springer, 2020: 56-71.
|
[12] |
BREIMAN L . Random forests[J]. Machine Learning, 2001,45(1): 5-32.
|
[13] |
陈卓, 吕娜 . 基于随机森林和XGBoost的网络入侵检测模型[J]. 信号处理, 2020,36(7): 1055-1064.
|
|
CHEN Z , LYU N . Network intrusion detection model based on random forest and XGBoost[J]. Journal of Signal Processing, 2020,36(7): 1055-1064.
|
[14] |
HE K M , ZHANG X Y , REN S Q ,et al. Deep residual learning for image recognition[C]// Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 770-778.
|
[15] |
甘众远 . 基于深度学习的轻量化恶意流量识别及其分布式方法的研究与实现[D]. 南京:南京邮电大学, 2021.
|
|
GAN Z Y . Research and implementation of lightweight malicious traffic identification and its distributed method based on deep learning[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2021.
|
[16] |
LOSHCHILOV I , HUTTER F . Decoupled weight decay regularization[J]. arXiv preprint, 2017,arXiv:1711.05101.
|
[17] |
KINGMA D P , BA J . Adam:a method for stochastic optimization[J]. arXiv preprint, 2014,arXiv:1412.6980.
|
[18] |
刘云飞, 张俊然 . 深度神经网络学习率策略研究进展[J]. 控制与决策, 2022:0147.
|
|
LIU Y F , ZHANG J R . Research advances in deep neural networks learning rate strategies[J]. Control and Decision, 2022:0147.
|
[1] |
顾玥, 李丹, 高凯辉 . 基于机器学习和深度学习的网络流量分类研究[J]. 电信科学, 2021,37(3): 105-113.
|
|
GU Y , LI D , GAO K H . Research on network traffic classification based on machine learning and deep learning[J]. Telecommunications Science, 2021,37(3): 105-113.
|
[2] |
冯文博, 洪征, 吴礼发 ,等. 网络协议识别技术综述[J]. 计算机应用, 2019,39(12): 3604-3614.
|
|
FENG W B , HONG Z , WU L F ,et al. Review of network protocol recognition techniques[J]. Journal of Computer Applications, 2019,39(12): 3604-3614.
|
[3] |
WANG W , ZHU M , ZENG X W ,et al. Malware traffic classification using convolutional neural network for representation learning[C]// Proceedings of 2017 International Conference on Information Networking (ICOIN). Piscataway:IEEE Press, 2017: 712-717.
|
[4] |
FENG W B , HONG Z , WU L F ,et al. Network protocol recognition based on convolutional neural network[J]. China Communications, 2020,17(4): 125-139.
|
[5] |
SUN Y L , YUN B S , QIAN Y G ,et al. A Spark-based method for identifying large-scale network burst traffic[J]. Journal of Computers, 2021,32(4): 123-136.
|
[6] |
TONG V , TRAN H A , SOUIHI S ,et al. A novel QUIC traffic classifier based on convolutional neural networks[C]// Proceedings of 2018 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE Press, 2019: 1-6.
|
[7] |
HU X Y , GU C X , WEI F S . CLD-net:a network combining CNN and LSTM for Internet encrypted traffic classification[J]. Security and Communication Networks, 2021: 1-15.
|
[8] |
于帅, 董育宁, 邱晓晖 . 一种基于深度特征融合的网络流量分类方法[J]. 南京邮电大学学报(自然科学版), 2022,42(3): 82-89.
|
|
YU S , DONG Y N , QIU X H . A network traffic classification method based on deep feature fusion[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2022,42(3): 82-89.
|
[9] |
薛靖靓, 陈迎春, 李鸥 . 未知流量数据的智能特征提取与实时分类识别算法[J]. 信息工程大学学报, 2021,22(5): 597-605.
|
|
XUE J L , CHEN Y C , LI O . Intelligent feature extraction and real-time identification algorithm for unknown traffic data[J]. Journal of Information Engineering University, 2021,22(5): 597-605.
|