Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200126-7.doi: 10.11896/jsjkx.241200126
• Information Security • Previous Articles Next Articles
WANG Zhihong1, LIU Shengran2, CHI Zegui3, YANG Ying1
CLC Number:
| [1]MADHUKAR A,WILLIAMSON C.A longitudinal study ofP2P traffic classification[C]//Proceedings of the 14th IEEE International Symposium on Modeling,Analysis,and Simulation.Piscataway:IEEE,2006:179-188. [2]GU C,ZHANG S,SUN Y.Realtime encrypted traffic identification using machine learning[J].Journal of Software,2011,6(6):1009-1016. [3]HAYES J,DANEZIES G.k-fingerprinting:A robust scalablewebsite fingerprinting technique[C]//Proceedings of the 25th USENIX Security Symposium.New York:ACM,2016:1187-1203. [4]SUN G L,XUE Y,DONG Y,et al.An novel hybrid method for effectively classifying encrypted traffic[C]//Proceedings of the 2010 IEEE Global Telecommunications Conference.Piscataway:IEEE,2010:1-5. [5]NGUYEN T T T,ARMITAGE G.A survey of techniques for internet traffic classification using machine learning[J].IEEE communications surveys & tutorials,2008,10(4):56-76. [6]WANG Z.The applications of deep learning on traffic identification[J].BlackHat,2015,24(11):1-10. [7]SONG M,RAN J,LI S.Encrypted traffic classification based on text convolution neural networks[C]//Proceedings of the 2019 IEEE 7th International Conference on Computer Science and Network Technology.Piscataway:IEEE,2019:432-436. [8]XUE W L,YU J,GUO Z Q,et al.End-to End Encrypted Traffic Classification Based on Feature Fusion Convolutional Neural Network[J].Computer Engineering and Applications,2023,9(1):32-41. [9]SHI G Z,LI K Y,LIU Y,et al.Encrypted traffic identification method based on deep residual capsule network with attention mechanism[J].Chinese Journal of Network and Information Security,2023,9(1):32-41. [10]LIU C,HE L,XIONG G,et al.Fs-net:A flow sequence network for encrypted traffic classification[C]//The Proceeding of the 2019-IEEE Conference on Computer Communications.Piscataway:IEEE,2019:1171-1179. [11]ZHANG S R,BO Y J,CHEN B,et al.Encrypted Traffic Classification Method Based on Multi-Layer Bidirectional SRU and Attention Model[J].Computer Engineering,2022,48(11):127-136. [12]LIN P,YE K,HU Y,et al.A Novel Multimodal deep learning framework for encrypted traffic classification[J].IEEE/ACM Transactions on Networking,2023,31(3):1369-1384. [13]HUOH T L,LUO Y,LI P,et al.Flow-based encrypted network traffic classification with graph neural networks[J].IEEE Transactions on Network and Service Management,2022,20(2):1224-1237. [14]OKONKWO Z,FOO E,HOU Z,et al.Encrypted network traffic classification with higher order graph neural network[C]//The Proceeding of the 2023 Australasian Conference on Information Security and Privacy.Cham:Springer,2023:630-650. [15]YU X W,CHEN D W.Research on Encrypted Traffic Classification of Graph Neural Network Based on Attention Mechanism[J].Journal of Information Security Research,2023,9(1):9-13. [16]YANG Y,YAN Y,GAO Z,et al.A network traffic classificationmethod based on dual-mode feature extraction and hybrid neural networks[J].IEEE Transactions on Network and Service Mana-gement,2023,20(4):4073-4084. [17]DENG X,LIU C H,OU Y Y,et al.Encrypted malicious trafficidentification based on CNN CBAM-BiGRU attention[J].Computer Engineering,2023,49(11):178-186. [18]CHEN S Y,MA H L,ZHANG J H.Encrypted traffic classification based on CNN and BiGRU based on attention mechanism[J].Computer Science,2024,51(8):396-402. [19]HU G,XIAO X,SHEN M,et al.TCGNN:Packet-grained network traffic classification via graph neural networks[J].Engineering Applications of Artificial Intelligence,2023,123:106531. [20]CHEN Z,CHENG G,NIU D,et al.WFF-EGNN:encryptedtraffic classification based on weaved flow fragment via ensemble graph neural networks[J].IEEE Transactions on Machine Learning in Communications and Networking,2023,1:389-411. [21]CAI W,GOU G,JIANG M,et al.Memg:mobile encrypted traffic classification with markov chains and graph neural network[C]//The Proceeding of the 2021 IEEE 23rd International Conference on High Performance Computing & Communications;7th Int Conf on Data Science & Systems;19th Int Conf on Smart City;7th Int Conf on Dependability in Sensor,Cloud & Big Data Systems & Application(HPCC/DSS/SmartCity/DependSys).Piscataway:IEEE,2021:478-486. [22]SHEN M,ZHANG J,ZHU L,et al.Accurate decentralized application identification via encrypted traffic analysis using graph neural networks[J].IEEE Transactions on Information Forensics and Security,2021,16:2367-2380. [23]WANG Q F,ZHAI J T,CHEN W,et al.An encrypted trafficclassification method based on graph convolutional neural networks[J].Electronic measurement technology,2022,45(14):109-115. [24]LIN H G,ZHANG Y L,GUO N X,et al.P2P Botnet Detection Method Based on Graph Neural Network[J].Advanced Engineering Sciences,2022,54(2):65-72. [25]LI M X,PENG C,WANG H,et al.A robust encrypted traffic identification scheme based on graph neural network[J].Telecommunications Science,2024,40(6):89-99. [26]GIOACCHINI L,CAVALLO A,MELLIA M,et al.Exploringtemporal GNN embeddings for darknet traffic analysis[C]//Proceedings of the 2nd on Graph Neural Networking Workshop.New York:ACM,2023:31-36. [27]ZHAO J J,LI Q,LIU S L,et al.Towards traffic supervision in 6G:a graph neural network-based encrypted malicious traffic detection method[J].Scientia Sinica Informationis,2022,52:270-286. [28]TAO Y,DU L M,SHEN T T.Encrypted Traffic Identification Based on Two-branch Multi-stage Spatiotemporal Feature Fusion[J].Journal of Chinese Computer Systems,2024,45(6):1489-1495. [29]HE H Y,YANG Z G,CHEN X N.PERT:payload encoding rep-resentation from transformer for encrypted traffic classification [J].ZTE Communications,2022,19(4):90-97. |
| [1] | LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79. |
| [2] | WU Hanyu, LIU Tianci, JIAO Tuocheng, CHE Chao. DHMP:Dynamic Hypergraph-enhanced Medication-aware Model for Temporal Health EventPrediction [J]. Computer Science, 2025, 52(9): 88-95. |
| [3] | SU Shiyu, YU Jiong, LI Shu, JIU Shicheng. Cross-domain Graph Anomaly Detection Via Dual Classification and Reconstruction [J]. Computer Science, 2025, 52(8): 374-384. |
| [4] | TANG Boyuan, LI Qi. Review on Application of Spatial-Temporal Graph Neural Network in PM2.5 ConcentrationForecasting [J]. Computer Science, 2025, 52(8): 71-85. |
| [5] | GUO Husheng, ZHANG Xufei, SUN Yujie, WANG Wenjian. Continuously Evolution Streaming Graph Neural Network [J]. Computer Science, 2025, 52(8): 118-126. |
| [6] | LUO Xuyang, TAN Zhiyi. Knowledge-aware Graph Refinement Network for Recommendation [J]. Computer Science, 2025, 52(7): 103-109. |
| [7] | HAO Jiahui, WAN Yuan, ZHANG Yuhang. Research on Node Learning of Graph Neural Networks Fusing Positional and StructuralInformation [J]. Computer Science, 2025, 52(7): 110-118. |
| [8] | JIANG Kun, ZHAO Zhengpeng, PU Yuanyuan, HUANG Jian, GU Jinjing, XU Dan. Cross-modal Hypergraph Optimisation Learning for Multimodal Sentiment Analysis [J]. Computer Science, 2025, 52(7): 210-217. |
| [9] | ZHENG Chuangrui, DENG Xiuqin, CHEN Lei. Traffic Prediction Model Based on Decoupled Adaptive Dynamic Graph Convolution [J]. Computer Science, 2025, 52(6A): 240400149-8. |
| [10] | TENG Minjun, SUN Tengzhong, LI Yanchen, CHEN Yuan, SONG Mofei. Internet Application User Profiling Analysis Based on Selection State Space Graph Neural Network [J]. Computer Science, 2025, 52(6A): 240900060-8. |
| [11] | SHI Enyi, CHANG Shuyu, CHEN Kejia, ZHANG Yang, HUANG Haiping. BiGCN-TL:Bipartite Graph Convolutional Neural Network Transformer Localization Model for Software Bug Partial Localization Scenarios [J]. Computer Science, 2025, 52(6A): 250200086-11. |
| [12] | WANG Jinghong, WU Zhibing, WANG Xizhao, LI Haokang. Semantic-aware Heterogeneous Graph Attention Network Based on Multi-view RepresentationLearning [J]. Computer Science, 2025, 52(6): 167-178. |
| [13] | QIAO Yu, XU Tao, ZHANG Ya, WEN Fengpeng, LI Qiangwei. Graph Neural Network Defect Prediction Method Combined with Developer Dependencies [J]. Computer Science, 2025, 52(6): 52-57. |
| [14] | HUANG Qian, SU Xinkai, LI Chang, WU Yirui. Hypergraph Convolutional Network with Multi-perspective Topology Refinement forSkeleton-based Action Recognition [J]. Computer Science, 2025, 52(5): 220-226. |
| [15] | WU Pengyuan, FANG Wei. Study on Graph Collaborative Filtering Model Based on FeatureNet Contrastive Learning [J]. Computer Science, 2025, 52(5): 139-148. |
|
||