Computer Science ›› 2024, Vol. 51 ›› Issue (9): 365-370.doi: 10.11896/jsjkx.230800079
• Information Security • Previous Articles Next Articles
TANG Ying, WANG Baohui
CLC Number:
[1]ZHAO J J,LI Q,LIU S L.Towards traffic supervision in 6G:a graph neural network-based encrypted malicious traffic detection method[J].Chinese Science:Information Science,2022,52(2):270-286. [2]HTTPS encryption on the web(2023)[R/OL].Google Transparency Report.https://transparencyreport.google.com/https/overview?hl=en. [3]KANG P,YANG W Z,MA H Q.TLS Malicious EncryptedTraffic Identification Research [J].Computer Engineering and Applications,2022,58(12):1-11. [4]HU B.Research on the Detection of Malicious SSL/TLS Encrypted Traffic[D].Shanghai:Shanghai Jiao Tong University,2022. [5]LASHKARI A H,KADIR A F A,TAHERI L,et al.Toward developing a systematic approach to generate benchmark android malware datasets and classification[C]//2018 International Carnahan Conference on Security Technology(ICCST).IEEE,2018:1-7. [6]CHEN R,LI Y,FANG W.Android malware identification based on traffic analysis[C]//International Conference on Artificial Intelligence and Security.Cham:Springer International Publi-shing,2019:293-303. [7]ANDERSON B,MCGREW D.Identifying encrypted malwaretraffic with contextual flow data[C]//Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security.2016:35-46. [8]HUO Y H,ZHAO F Q.Encrypted Malicious Traffic Detection Based on Stacking and Multi-Feature Fusion[J].Computer Engineering,2023,49(5):165-172,180. [9]HUO Y H,ZHAO F Q,WU W H.Multi-feature fusion basedencrypted malicious traffic detection method for coal mine network [J].Journal of Mine Automation,2022,48(7):142-148. [10]CHEN J,HUANG J,LU X.Convolutional neural network-based identification of malicious traffic for TLS encryption[C]//2022 7th International Conference on Intelligent Computing and Signal Processing(ICSP).IEEE,2022:1544-1549. [11]YANG Z C,ZHU C W,CHOU J.Encrypted malicious traffic detection method based on TextCNN [J].Journal of Guangzhou University( Natural Science Edition),2022,21(1):1-9. [12]ZHOU Y,ZHANG J,JIANG B.Detection of Malicious Encryp-ted Traffic Based on LSTM Recurrent Neural Network [J].Computer Applications and Software,2020,37(2):308- 312. [13]LOPEZ-MARTIN M,CARRO B,SANCHEZ-ESGUEVILLASA,et al.Network traffic classifier with convolutional and recurrent neural networks for Internet of Things[J].IEEE Access,2017,5:18042-18050. [14]JIANG T T,YIN W X,CAI B.Encrypted Malicious TrafficIdentification Based on Hierarchical Spatiotemporal Feature and Multi-Head Attention [J].Computer Engineering,2021,47(7):101-108. [15]DAINOTTI A,PESCAPE A,CLAFFY K C.Issues and future directions in traffic classification[J].IEEE Network,2012,26(1):35-40. [16]CHEN M H,ZHU Y F,LU B.Classification of ApplicationType of Encrypted Traffic Based on Attention CNN [J].Computer Science,2021,48(4):325-332. [17]ZHANG X L,CHENG Q F,MA J F.Advance in TLS 1.3 Protocol Studies [J].Journal of Wuhan University(Natural Science Edition),2018,64(6):471-484. [18]WANG Q F,ZHAI J T,CHEN W.An encrypted traffic classification method based on graph convolutional neural networks [J].Electronic Measurement Technology,2022,45(14):109-115. [19]KIPF T N,WELLING M.Semi-supervised classification withgraph convolutional networks[J].arXiv:1609.02907,2016. [20]LEE J,LEE I,KANG J.Self-attention graph pooling [C]//International Conference on Machine Learning.PMLR,2019:3734-3743. [21]DENG H C.Research on Fake News Detection Based on Interaction Graph Hierarchical Pooling [D].Wuhan:Huazhong University of Science and Technology,2022. |
[1] | CHEN Liang, SUN Cong. Deep-learning Based DKOM Attack Detection for Linux System [J]. Computer Science, 2024, 51(9): 383-392. |
[2] | CHEN Shanshan, YAO Subin. Study on Recommendation Algorithms Based on Knowledge Graph and Neighbor PerceptionAttention Mechanism [J]. Computer Science, 2024, 51(8): 313-323. |
[3] | HU Haibo, YANG Dan, NIE Tiezheng, KOU Yue. Graph Contrastive Learning Incorporating Multi-influence and Preference for Social Recommendation [J]. Computer Science, 2024, 51(7): 146-155. |
[4] | WEI Ziang, PENG Jian, HUANG Feihu, JU Shenggen. Text Classification Method Based on Multi Graph Convolution and Hierarchical Pooling [J]. Computer Science, 2024, 51(7): 303-309. |
[5] | PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5. |
[6] | DONG Wanqing, ZHAO Zirong, LIAO Huimin, XIAO Hui, ZHANG Xiaoliang. Research and Implementation of Urban Traffic Accident Risk Prediction in Dynamic Road Network [J]. Computer Science, 2024, 51(6A): 230500118-10. |
[7] | LIU Wei, SONG You, ZHUO Peiyan, WU Weiqiang, LIAN Xin. Study on Kcore-GCN Anti-fraud Algorithm Fusing Multi-source Graph Features [J]. Computer Science, 2024, 51(6A): 230600040-7. |
[8] | CHU Xiaoxi, ZHANG Jianhui, ZHANG Desheng, SU Hui. Browser Fingerprint Tracking Based on Improved GraphSAGE Algorithm [J]. Computer Science, 2024, 51(6): 409-415. |
[9] | CHEN Sishuo, WANG Xiaodong, LIU Xiyang. Survey of Breast Cancer Pathological Image Analysis Methods Based on Graph Neural Networks [J]. Computer Science, 2024, 51(6): 172-185. |
[10] | LU Min, YUAN Ziting. Graph Contrast Learning Based Multi-graph Neural Network for Session-based RecommendationMethod [J]. Computer Science, 2024, 51(5): 54-61. |
[11] | LAN Yongqi, HE Xingxing, LI Yingfang, LI Tianrui. New Graph Reduction Representation and Graph Neural Network Model for Premise Selection [J]. Computer Science, 2024, 51(5): 193-199. |
[12] | ZHANG Liying, SUN Haihang, SUN Yufa , SHI Bingbo. Review of Node Classification Methods Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(4): 95-105. |
[13] | ZHANG Tao, LIAO Bin, YU Jiong, LI Ming, SUN Ruina. Benchmarking and Analysis for Graph Neural Network Node Classification Task [J]. Computer Science, 2024, 51(4): 132-150. |
[14] | LUO Zeyang, TIAN Hua, DOU Yingtong, LI Manwen, ZHANG Zehua. Fake Review Detection Based on Residual Networks Fusion of Multi-relationship Review Features [J]. Computer Science, 2024, 51(4): 314-323. |
[15] | ZHENG Cheng, SHI Jingwei, WEI Suhua, CHENG Jiaming. Dual Feature Adaptive Fusion Network Based on Dependency Type Pruning for Aspect-basedSentiment Analysis [J]. Computer Science, 2024, 51(3): 205-213. |
|