Computer Science ›› 2021, Vol. 48 ›› Issue (4): 295-302.doi: 10.11896/jsjkx.200700189
Special Issue: Information Security
• Information Security • Previous Articles Next Articles
ZHOU Yi-min1,2, LIU Fang-zheng1 , WANG Yong1
CLC Number:
[1]WANG T,HU A Q.A Conformance Test Method of IPSecVPN Protocol based on Edge Detection[J].Information Network Security,2014(2):7-11. [2]FADLULLAH Z M,TALEB T,VASILAKOS A V,et al.DTRAB:combating against attacks on encrypted protocols through traffic feature analysis[J].IEEE/ACM Transactions on Networking(TON),2010,18(4):1234-1247. [3]ROUGHAN M,SEN S,SPATSCHECK O,et al.Class-of-service mapping for QoS:a statistical signature-based approach to IP traffic classification[C]//The 4th ACM SIGCOMM Conference on Internet Measurement.ACM,2004:135-148. [4]PAN W,CHENG G,GUO X,et al.Review and perspective on encrypted traffic identification research[J].Journal on Communications,2016,37(9):154-167. [5]BERNAILLE L,TEIXEIRA R.Early recognition of encrypted applications[M]//Passive and Active Network Measurement.Springer Berlin Heidelberg,2007:165-175. [6]ZENG X,CHEN X,SHAO G,et al.Flow context and host behavior based Shadowsocks’s traffic identification[J].IEEE Access,2019,7:41017-41032. [7]LASHKARI A H,DRAPER-GIL G,MAMUN M S I,et al.Charac- terization of encrypted and VPN traffic using time-related features[C]//The International Conference on Information Systems Security and Privacy.2016:94-98. [8]YILDIRIM T,RADCLIFFE P J.VoIP traffic classification inIPSec tunnels[C]//2010 International Conference onElectro-nics and Information Engineering.IEEE,2010,1:v1-151-v1-157. [9]WANG Q L,WANG Z X,ZHANG L C,et al.GMM-based Application-layer Protocol Identification of ESP Traffic[J].Computer Engineering,2011,37(24):91-93. [10]BAGUI S,FANG X,KALAIMANNAN E,et al.Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features[J].Journal of Cyber Security Technology,2017,1(2):108-126. [11]DONG S,LI R.Traffic identification method based on multiple probabilistic neural network model[J].Neural Computing and Applications,2019,31(2):473-487. [12]ZHUO C,ZHANG.The research and comparison of the ah and esp in IPSec[J].Computer Applications and Software,2004(7):105-106,124. [13]MOORE A,ZUEV D,CROGAN M.Discriminators for use in flow-based classification Technical report[D].London:Queen Mary University of London,Department of Computer Science,2005:6-13. [14]DIAS K L,PONGELUPE M A,CAMINHAS W M,et al.An innovative approach for real-time network traffic classification[J].Computer Networks,2019,158:143-157. [15]DAINOTTI A,PESCAPE A,CLAFFY K C.Issues and future directions in traffic classification[J].Network,IEEE,2012,26(1):35-40. [16]BREIMAN L.Random forest [J].Machine Learning,2001,5(1):5-32. [17]WEN B W,DONG W H,XIE W J,et al.Optimization of random forest parameters based on improved grid search algorithm[J].Computer Engineering and Applications,2018,54(10):159-162. [18]WU C W,LIANG J H,WANG W.Random Forest Algorithm Based on Recursive Feature Elimination[J].Statistics and decision making,2017(21):60-63. [19]CHAWLA N V,KARAKOULAS G.Learning From LabeledAnd Unlabeled Data:An Empirical Study Across Techniques And Domains[J].Journal of Artificial Intelligence Research,2011,23(1):331-366. [20]YAO W,WEI L I,WU K H,et al.Application of Fusion Model of GBDT and LR in Encrypted Traffic Identification[J].Computer and Modernization,2020(3):93. |
[1] | GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49. |
[2] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[3] | WANG Bing, WU Hong-liang, NIU Xin-zheng. Robot Path Planning Based on Improved Potential Field Method [J]. Computer Science, 2022, 49(7): 196-203. |
[4] | WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246. |
[5] | QUE Hua-kun, FENG Xiao-feng, LIU Pan-long, GUO Wen-chong, LI Jian, ZENG Wei-liang, FAN Jing-min. Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection [J]. Computer Science, 2022, 49(6A): 790-794. |
[6] | ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210. |
[7] | LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114. |
[8] | YANG Xiao-qin, LIU Guo-jun, GUO Jian-hui, MA Wen-tao. Full Reference Color Image Quality Assessment Method Based on Spatial and Frequency Domain Joint Features with Random Forest [J]. Computer Science, 2021, 48(8): 99-105. |
[9] | ZHENG Jian-hua, LI Xiao-min, LIU Shuang-yin, LI Di. Improved Random Forest Imbalance Data Classification Algorithm Combining Cascaded Up-sampling and Down-sampling [J]. Computer Science, 2021, 48(7): 145-154. |
[10] | CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463. |
[11] | LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467. |
[12] | XU Ming-ze, WEI Ming-hui, DENG Shuang, CAI Wei. Application of Multi-model Ensemble Learning in Prediction of Mechanical Drilling Rate [J]. Computer Science, 2021, 48(6A): 619-622. |
[13] | XU Jia-qing, HU Xiao-yue, TANG Fu-qiao, WANG Qiang, HE Jie. Detecting Blocking Failure in High Performance Interconnection Networks Based on Random Forest [J]. Computer Science, 2021, 48(6): 246-252. |
[14] | ZHANG Tian-rui, WEI Ming-qi, GAO Xiu-xiu. Prediction Model of Bubble Dissolution Time in Selective Laser Sintering Based on IPSO-WRF [J]. Computer Science, 2021, 48(11A): 638-643. |
[15] | LIU Zhen-peng, SU Nan, QIN Yi-wen, LU Jia-huan, LI Xiao-fei. FS-CRF:Outlier Detection Model Based on Feature Segmentation and Cascaded Random Forest [J]. Computer Science, 2020, 47(8): 185-188. |
|