Skip to main content
Erschienen in: Annals of Telecommunications 11-12/2020

22.06.2020

A review on machine learning–based approaches for Internet traffic classification

verfasst von: Ola Salman, Imad H. Elhajj, Ayman Kayssi, Ali Chehab

Erschienen in: Annals of Telecommunications | Ausgabe 11-12/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Traffic classification acquired the interest of the Internet community early on. Different approaches have been proposed to classify Internet traffic to manage both security and Quality of Service (QoS). However, traditional classification approaches consisting of modifying the Transmission Control Protocol/Internet Protocol (TCP/IP) scheme have not been adopted due to their complex management. In addition, port-based methods and deep packet inspection have limitations in dealing with new traffic characteristics (e.g., dynamic port allocation, tunneling, encryption). Conversely, machine learning (ML) solutions effectively classify traffic down to the device type and specific user action. Another research direction aims to anonymize Internet traffic and thwart classification to maintain user privacy. Existing traffic surveys focus on classification and do not consider anonymization. Here, we review the Internet traffic classification and obfuscation techniques, largely considering the ML-based solutions. In addition, this paper presents a comprehensive review of various data representation methods, and the different objectives of Internet traffic classification. Finally, we present the key findings, limitations, and recommendations for future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Leiner BM, Cerf VG, Clark DD, Kahn RE, Kleinrock L, Lynch DC, Postel J, Roberts LG, Wolff S (2009) A brief history of the internet. ACM SIGCOMM Comput Commun Rev 39(5):22–31 Leiner BM, Cerf VG, Clark DD, Kahn RE, Kleinrock L, Lynch DC, Postel J, Roberts LG, Wolff S (2009) A brief history of the internet. ACM SIGCOMM Comput Commun Rev 39(5):22–31
2.
Zurück zum Zitat Salman Ola, Elhajj Imad, Chehab Ali, Kayssi Ayman (2018) Iot survey: an sdn and fog computing perspective. Comput Netw 143:221–246 Salman Ola, Elhajj Imad, Chehab Ali, Kayssi Ayman (2018) Iot survey: an sdn and fog computing perspective. Comput Netw 143:221–246
3.
Zurück zum Zitat Seddiki MS, Shahbaz M, Donovan S, Grover S, Park M, Feamster N, Song YQ (2014) Flowqos: Qos for the rest of us. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN ’14, pp 207–208. ACM, New York Seddiki MS, Shahbaz M, Donovan S, Grover S, Park M, Feamster N, Song YQ (2014) Flowqos: Qos for the rest of us. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN ’14, pp 207–208. ACM, New York
4.
Zurück zum Zitat Park B, Won Y, Chung J, Kim MS, Hong JWK (2013) Fine-grained traffic classification based on functional separation. Int J Netw Manag 23(5):350–381 Park B, Won Y, Chung J, Kim MS, Hong JWK (2013) Fine-grained traffic classification based on functional separation. Int J Netw Manag 23(5):350–381
5.
Zurück zum Zitat Aceto G, Dainotti A, De Donato W, Pescapé A (2010) Portload: taking the best of two worlds in traffic classification. In: 2010 INFOCOM IEEE Conference on Computer Communications Workshops, pp 1–5. IEEE Aceto G, Dainotti A, De Donato W, Pescapé A (2010) Portload: taking the best of two worlds in traffic classification. In: 2010 INFOCOM IEEE Conference on Computer Communications Workshops, pp 1–5. IEEE
6.
Zurück zum Zitat Tongaonkar A, Keralapura R, Nucci A (2012) Challenges in network application identification. In LEET Tongaonkar A, Keralapura R, Nucci A (2012) Challenges in network application identification. In LEET
7.
Zurück zum Zitat Razaghpanah A, Niaki AA, Rodriguez NV, Sundaresan S, Amann J, Gill P (2017) Studying tls usage in android apps. In: Proceedings of the 13th International Conference on Emerging Networking EXperiments and Technologies, coNEXT’17, pp 350–362. ACM, New York Razaghpanah A, Niaki AA, Rodriguez NV, Sundaresan S, Amann J, Gill P (2017) Studying tls usage in android apps. In: Proceedings of the 13th International Conference on Emerging Networking EXperiments and Technologies, coNEXT’17, pp 350–362. ACM, New York
8.
Zurück zum Zitat Qin D, Yang J, Wang J, Zhang B (2011) Ip traffic classification based on machine learning. In: 2011 IEEE 13th International Conference on Communication Technology, pp 882–886, IEEE Qin D, Yang J, Wang J, Zhang B (2011) Ip traffic classification based on machine learning. In: 2011 IEEE 13th International Conference on Communication Technology, pp 882–886, IEEE
9.
Zurück zum Zitat Dromard J, Owezarski P, Mozo V, Ordozgoiti A, Vakaruk B (2016) Delivrable algorithms description: Traffic pattern evolution and unsupervised network anomaly detection ontic d4. 2 Dromard J, Owezarski P, Mozo V, Ordozgoiti A, Vakaruk B (2016) Delivrable algorithms description: Traffic pattern evolution and unsupervised network anomaly detection ontic d4. 2
10.
Zurück zum Zitat Namdev N, Agrawal S, Silkari S (2015) Recent advancement in machine learning based internet traffic classification. Procedia Computer Science 60:784–791 Namdev N, Agrawal S, Silkari S (2015) Recent advancement in machine learning based internet traffic classification. Procedia Computer Science 60:784–791
11.
Zurück zum Zitat Tabatabaei TS, Adel M, Karray F, Kamel M (2012) Machine learning-based classification of encrypted internet traffic. In: International Workshop on Machine Learning and Data Mining in Pattern Recognition. Springer, Berlin, pp 578–592 Tabatabaei TS, Adel M, Karray F, Kamel M (2012) Machine learning-based classification of encrypted internet traffic. In: International Workshop on Machine Learning and Data Mining in Pattern Recognition. Springer, Berlin, pp 578–592
12.
Zurück zum Zitat Cheng G, Hu Y (2018) Encrypted traffic identification based on n-gram entropy and cumulative sum test. In: Proceedings of the 13th International Conference on Future Internet Technologies, pp 9 ACM Cheng G, Hu Y (2018) Encrypted traffic identification based on n-gram entropy and cumulative sum test. In: Proceedings of the 13th International Conference on Future Internet Technologies, pp 9 ACM
13.
Zurück zum Zitat Niemczyk B, Rao P (2014) Identification over encrypted channels. BlackHat USA Niemczyk B, Rao P (2014) Identification over encrypted channels. BlackHat USA
14.
Zurück zum Zitat Alshammari R, Zincir-Heywood AN (2009) Machine learning based encrypted traffic classification: Identifying ssh and skype. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp 1–8. IEEE Alshammari R, Zincir-Heywood AN (2009) Machine learning based encrypted traffic classification: Identifying ssh and skype. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp 1–8. IEEE
15.
Zurück zum Zitat Alshammari R, Zincir-Heywood AN (2015) How robust can a machine learning approach be for classifying encrypted voip? J Netw Syst Manag 23(4):830–869 Alshammari R, Zincir-Heywood AN (2015) How robust can a machine learning approach be for classifying encrypted voip? J Netw Syst Manag 23(4):830–869
16.
Zurück zum Zitat Bernaille L, Teixeira R (2007) Early recognition of encrypted applications. In: International Conference on Passive and Active Network Measurement, pp 165–175. Springer, Berlin Bernaille L, Teixeira R (2007) Early recognition of encrypted applications. In: International Conference on Passive and Active Network Measurement, pp 165–175. Springer, Berlin
17.
Zurück zum Zitat Cao Z, Xiong G, Zhao Y, Li Z, Guo L (2014) A survey on encrypted traffic classification. In: International Conference on Applications and Techniques in Information Security, pp 73–81. Springer, Berlin Cao Z, Xiong G, Zhao Y, Li Z, Guo L (2014) A survey on encrypted traffic classification. In: International Conference on Applications and Techniques in Information Security, pp 73–81. Springer, Berlin
18.
Zurück zum Zitat Arndt DJ, Zincir-Heywood AN (2011) A comparison of three machine learning techniques for encrypted network traffic analysis. In: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp 107–114. IEEE Arndt DJ, Zincir-Heywood AN (2011) A comparison of three machine learning techniques for encrypted network traffic analysis. In: 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp 107–114. IEEE
19.
Zurück zum Zitat Gu C, Zhang S, Sun Y (2011) Realtime encrypted traffic identification using machine learning. JSW 6 (6):1009–1016 Gu C, Zhang S, Sun Y (2011) Realtime encrypted traffic identification using machine learning. JSW 6 (6):1009–1016
20.
Zurück zum Zitat He G, Xu B, Zhang L, Zhu H (2018) Mobile app identification for encrypted network flows by traffic correlation. Int J Distrib Sen Netw 14(12):1550147718817292 He G, Xu B, Zhang L, Zhu H (2018) Mobile app identification for encrypted network flows by traffic correlation. Int J Distrib Sen Netw 14(12):1550147718817292
21.
Zurück zum Zitat Zhu H, Zhu L (2017) Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor. Cluster Computing, pp 1–10 Zhu H, Zhu L (2017) Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor. Cluster Computing, pp 1–10
22.
Zurück zum Zitat Liu J, Fu Y, Ming J, Ren Y, Sun L, Xiong H (2017) Effective and real-time in-app activity analysis in encrypted internet traffic streams. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 335–344 ACM Liu J, Fu Y, Ming J, Ren Y, Sun L, Xiong H (2017) Effective and real-time in-app activity analysis in encrypted internet traffic streams. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 335–344 ACM
23.
Zurück zum Zitat Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2017) Deep packet: a novel approach for encrypted traffic classification using deep learning, Soft Computing, pp 1–14 Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2017) Deep packet: a novel approach for encrypted traffic classification using deep learning, Soft Computing, pp 1–14
24.
Zurück zum Zitat Mahdavi E, Fanian A, Hassannejad H (2018) Encrypted traffic classification using statistical features. ISeCure 10(1):29–43 Mahdavi E, Fanian A, Hassannejad H (2018) Encrypted traffic classification using statistical features. ISeCure 10(1):29–43
25.
Zurück zum Zitat Wang Q, Yahyavi A, Kemme B, He W (2015) I know what you did on your smartphone: Inferring app usage over encrypted data traffic. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp 433–441. IEEE Wang Q, Yahyavi A, Kemme B, He W (2015) I know what you did on your smartphone: Inferring app usage over encrypted data traffic. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp 433–441. IEEE
26.
Zurück zum Zitat Xu Q, Liao Y, Miskovic S, Morley ZM, Baldi M, Nucci A, Andrews T (2015) Automatic generation of mobile app signatures from traffic observations. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 1481–1489. IEEE Xu Q, Liao Y, Miskovic S, Morley ZM, Baldi M, Nucci A, Andrews T (2015) Automatic generation of mobile app signatures from traffic observations. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 1481–1489. IEEE
27.
Zurück zum Zitat Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. IEEE communications magazine 57(5):76–81 Rezaei S, Liu X (2019) Deep learning for encrypted traffic classification: an overview. IEEE communications magazine 57(5):76–81
28.
Zurück zum Zitat Leroux S, Bohez S, Maenhaut PJ, Meheus N, Simoens P, Dhoedt B (2018) Fingerprinting encrypted network traffic types using machine learning. In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp 1–5. IEEE Leroux S, Bohez S, Maenhaut PJ, Meheus N, Simoens P, Dhoedt B (2018) Fingerprinting encrypted network traffic types using machine learning. In: NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp 1–5. IEEE
29.
Zurück zum Zitat Saltaformaggio B, Choi H, Johnson K, Kwon Y, Zhang Q, Zhang X, Xu D, Qian J (2016) Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In: 10th {USENIX}, Workshop on Offensive Technologies ({WOOT} 16) Saltaformaggio B, Choi H, Johnson K, Kwon Y, Zhang Q, Zhang X, Xu D, Qian J (2016) Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In: 10th {USENIX}, Workshop on Offensive Technologies ({WOOT} 16)
30.
Zurück zum Zitat Taylor VF, Spolaor R, Conti M, Martinovic I (2016) Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp 439–454. IEEE Taylor VF, Spolaor R, Conti M, Martinovic I (2016) Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp 439–454. IEEE
31.
Zurück zum Zitat Taylor VF, Spolaor R, Conti M, Martinovic I (2017) Robust smartphone app identification via encrypted network traffic analysis. IEEE Transactions on Information Forensics and Security 13(1):63–78 Taylor VF, Spolaor R, Conti M, Martinovic I (2017) Robust smartphone app identification via encrypted network traffic analysis. IEEE Transactions on Information Forensics and Security 13(1):63–78
32.
Zurück zum Zitat Velan P, Čermák M, Čeleda P, drašar M (2015) A survey of methods for encrypted traffic classification and analysis. Int J Netw Manag 25(5):355–374 Velan P, Čermák M, Čeleda P, drašar M (2015) A survey of methods for encrypted traffic classification and analysis. Int J Netw Manag 25(5):355–374
33.
Zurück zum Zitat Wang W, Zhu M, Wang J, Zeng X, Zhongzhen Y (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference On Intelligence and Security Informatics (ISI), pp 43–48. IEEE Wang W, Zhu M, Wang J, Zeng X, Zhongzhen Y (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference On Intelligence and Security Informatics (ISI), pp 43–48. IEEE
34.
Zurück zum Zitat Fu Y, Xiong H, Lu X, Yang J, Chen C (2016) Service usage classification with encrypted internet traffic in mobile messaging apps. IEEE Trans Mob Comput 15(11):2851–2864 Fu Y, Xiong H, Lu X, Yang J, Chen C (2016) Service usage classification with encrypted internet traffic in mobile messaging apps. IEEE Trans Mob Comput 15(11):2851–2864
35.
Zurück zum Zitat Liu Y, Chen J, Chang P, Yun X (2017) A novel algorithm for encrypted traffic classification based on sliding window of flow’s first n packets. In: 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), pp 463–470. IEEE Liu Y, Chen J, Chang P, Yun X (2017) A novel algorithm for encrypted traffic classification based on sliding window of flow’s first n packets. In: 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), pp 463–470. IEEE
36.
Zurück zum Zitat Claffy KC (1994) Internet traffic characterization. Department of Computer Science, San Diego Claffy KC (1994) Internet traffic characterization. Department of Computer Science, San Diego
37.
Zurück zum Zitat Paxson V (1994) Empirically derived analytic models of wide-area tcp connections. IEEE/ACM transactions on Networking 2(4):316–336 Paxson V (1994) Empirically derived analytic models of wide-area tcp connections. IEEE/ACM transactions on Networking 2(4):316–336
38.
Zurück zum Zitat Dewes C, Wichmann A, Feldmann A (2003) An analysis of internet chat systems. In: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pp 51–64 Dewes C, Wichmann A, Feldmann A (2003) An analysis of internet chat systems. In: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pp 51–64
41.
Zurück zum Zitat Yamansavascilar B, Amac Guvensan M, Gokhan Yavuz A, Karsligil ME (2017) Application identification via network traffic classification. In: 2017 International Conference on Computing, Networking and Communications (ICNC), pp 843–848. IEEE Yamansavascilar B, Amac Guvensan M, Gokhan Yavuz A, Karsligil ME (2017) Application identification via network traffic classification. In: 2017 International Conference on Computing, Networking and Communications (ICNC), pp 843–848. IEEE
42.
Zurück zum Zitat Huang H, Deng H, Chen J, Han L, Wang W (2018) Automatic multi-task learning system for abnormal network traffic detection. Int J Emerg Technol Learn 13(4):4–20 Huang H, Deng H, Chen J, Han L, Wang W (2018) Automatic multi-task learning system for abnormal network traffic detection. Int J Emerg Technol Learn 13(4):4–20
44.
Zurück zum Zitat Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS Performance Evaluation Review, ACM, vol 33, pp 50–60 Moore AW, Zuev D (2005) Internet traffic classification using bayesian analysis techniques. In: ACM SIGMETRICS Performance Evaluation Review, ACM, vol 33, pp 50–60
45.
Zurück zum Zitat Ertam F, Avci E (2017) A new approach for internet traffic classification: Ga-wk-elm. Measurement 95:135–142 Ertam F, Avci E (2017) A new approach for internet traffic classification: Ga-wk-elm. Measurement 95:135–142
46.
Zurück zum Zitat Li Z, Yuan R, Guan X (2007) Accurate classification of the internet traffic based on the svm method. In: 2007 IEEE International Conference on Communications, IEEE, pp 1373–1378 Li Z, Yuan R, Guan X (2007) Accurate classification of the internet traffic based on the svm method. In: 2007 IEEE International Conference on Communications, IEEE, pp 1373–1378
47.
Zurück zum Zitat Cao J, Fang Z, Qu G, Sun H, Zhang D (2017) An accurate traffic classification model based on support vector machines. Int J Netw Manag 27(1):e1962 Cao J, Fang Z, Qu G, Sun H, Zhang D (2017) An accurate traffic classification model based on support vector machines. Int J Netw Manag 27(1):e1962
48.
Zurück zum Zitat Auld T, Moore AW, Gull SF (2007) Bayesian neural networks for internet traffic classification. IEEE Trans Neur Netw 18(1):223–239 Auld T, Moore AW, Gull SF (2007) Bayesian neural networks for internet traffic classification. IEEE Trans Neur Netw 18(1):223–239
49.
Zurück zum Zitat Ran J, Kong X, Lin G, Yuan D, Hu H (2017) A self-adaptive network traffic classification system with unknown flow detection. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp 1215–1220. IEEE Ran J, Kong X, Lin G, Yuan D, Hu H (2017) A self-adaptive network traffic classification system with unknown flow detection. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp 1215–1220. IEEE
50.
Zurück zum Zitat Huang S, Chen K, Liu C, Liang A, Guan H (2009) A statistical-feature-based approach to internet traffic classification using machine learning. In: 2009 International Conference on Ultra Modern Telecommunications & Workshops, pp 1–6, IEEE Huang S, Chen K, Liu C, Liang A, Guan H (2009) A statistical-feature-based approach to internet traffic classification using machine learning. In: 2009 International Conference on Ultra Modern Telecommunications & Workshops, pp 1–6, IEEE
51.
Zurück zum Zitat Shi H, Li H, Zhang D, Cheng C, Cao X (2018) An efficient feature generation approach based on deep learning and feature selection techniques for traffic classification. Comput Netw 132:81–98 Shi H, Li H, Zhang D, Cheng C, Cao X (2018) An efficient feature generation approach based on deep learning and feature selection techniques for traffic classification. Comput Netw 132:81–98
52.
Zurück zum Zitat Yuan R, Li Z, Guan X, Xu L (2010) An svm-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149–156 Yuan R, Li Z, Guan X, Xu L (2010) An svm-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149–156
53.
Zurück zum Zitat Schmidt B, Kountanis D, Al-Fuqaha A (2014) Artificial immune system inspired algorithm for flow-based internet traffic classification. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp 664–667. IEEE Schmidt B, Kountanis D, Al-Fuqaha A (2014) Artificial immune system inspired algorithm for flow-based internet traffic classification. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp 664–667. IEEE
54.
Zurück zum Zitat Ding Y (2016) Imbalanced network traffic classification based on ensemble feature selection. In: 2016 IEEE International Conference On Signal Processing, Communications and Computing (ICSPCC), pp 1–4. IEEE Ding Y (2016) Imbalanced network traffic classification based on ensemble feature selection. In: 2016 IEEE International Conference On Signal Processing, Communications and Computing (ICSPCC), pp 1–4. IEEE
55.
Zurück zum Zitat Sun G, Chen T, Su Y, Li C (2018) Internet traffic classification based on incremental support vector machines. Mobile Networks and Applications 23(4):789–796 Sun G, Chen T, Su Y, Li C (2018) Internet traffic classification based on incremental support vector machines. Mobile Networks and Applications 23(4):789–796
56.
Zurück zum Zitat Huang Y, Li Y, Qiang B (2016) Internet traffic classification based on min-max ensemble feature selection. In: 2016 International Joint Conference on Neural Networks (IJCNN), pp 3485–3492. IEEE Huang Y, Li Y, Qiang B (2016) Internet traffic classification based on min-max ensemble feature selection. In: 2016 International Joint Conference on Neural Networks (IJCNN), pp 3485–3492. IEEE
57.
Zurück zum Zitat Dong S, Zhou DD, Ding W (2012) The study of network traffic identification based on machine learning algorithm. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks, pp 205–208. IEEE Dong S, Zhou DD, Ding W (2012) The study of network traffic identification based on machine learning algorithm. In: 2012 Fourth International Conference on Computational Intelligence and Communication Networks, pp 205–208. IEEE
58.
Zurück zum Zitat Dashevskiy M, Luo Z (2012) Two methods for reliable classification of network traffic. Progress in Artificial Intelligence 1(3):223–234 Dashevskiy M, Luo Z (2012) Two methods for reliable classification of network traffic. Progress in Artificial Intelligence 1(3):223–234
60.
Zurück zum Zitat Perera P, Tian YC, Fidge C, Kelly W (2017) A comparison of supervised machine learning algorithms for classification of communications network traffic. In: International Conference on Neural Information Processing, pp 445–454. Springer, Berlin Perera P, Tian YC, Fidge C, Kelly W (2017) A comparison of supervised machine learning algorithms for classification of communications network traffic. In: International Conference on Neural Information Processing, pp 445–454. Springer, Berlin
61.
Zurück zum Zitat Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for qos: a statistical signature-based approach to ip traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp 135–148. ACM Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for qos: a statistical signature-based approach to ip traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp 135–148. ACM
62.
Zurück zum Zitat Erman J, Arlitt M, Mahanti A (2006) Traffic classification using clustering algorithms. In: Proceedings of the 2006 SIGCOMM workshop on Mining network data, pp 281–286. ACM Erman J, Arlitt M, Mahanti A (2006) Traffic classification using clustering algorithms. In: Proceedings of the 2006 SIGCOMM workshop on Mining network data, pp 281–286. ACM
63.
Zurück zum Zitat Erman J , Mahanti A, Arlitt M (2006) Qrp05-4: Internet traffic identification using machine learning. In: IEEE Globecom 2006, pp 1–6. IEEE Erman J , Mahanti A, Arlitt M (2006) Qrp05-4: Internet traffic identification using machine learning. In: IEEE Globecom 2006, pp 1–6. IEEE
64.
Zurück zum Zitat Peng L, Yang B, Chen Y, Chen Z (2016) Effectiveness of statistical features for early stage internet traffic identification. Int J Parallel Prog 44(1):181–197 Peng L, Yang B, Chen Y, Chen Z (2016) Effectiveness of statistical features for early stage internet traffic identification. Int J Parallel Prog 44(1):181–197
65.
Zurück zum Zitat Peng L, Zhang H, Chen Y, Yang B (2017) Imbalanced traffic identification using an imbalanced data gravitation-based classification model. Comput Commun 102:177–189 Peng L, Zhang H, Chen Y, Yang B (2017) Imbalanced traffic identification using an imbalanced data gravitation-based classification model. Comput Commun 102:177–189
66.
Zurück zum Zitat Hernández-Campos F, Nobel AB, Smith FD, Jeffay K (2003) Statistical clustering of internet communication patterns. computing science and statistics, pp. 35 Hernández-Campos F, Nobel AB, Smith FD, Jeffay K (2003) Statistical clustering of internet communication patterns. computing science and statistics, pp. 35
67.
Zurück zum Zitat Williams N, Zander S, Armitage G (2006) A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification. ACM SIGCOMM Computer Communication Review 36(5):5–16 Williams N, Zander S, Armitage G (2006) A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification. ACM SIGCOMM Computer Communication Review 36(5):5–16
68.
Zurück zum Zitat McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: International workshop on passive and active network measurement, pp 205–214. Springer, Berlin McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: International workshop on passive and active network measurement, pp 205–214. Springer, Berlin
69.
Zurück zum Zitat Zander S, Nguyen T, Armitage G (2005) Self-learning ip traffic classification based on statistical flow characteristics. In: International Workshop on Passive and Active Network Measurement, pp 325–328. Springer, Berlin Zander S, Nguyen T, Armitage G (2005) Self-learning ip traffic classification based on statistical flow characteristics. In: International Workshop on Passive and Active Network Measurement, pp 325–328. Springer, Berlin
70.
Zurück zum Zitat Zander S, Nguyen T, Armitage G (2005) Automated traffic classification and application identification using machine learning. In: The IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) l, pp 250–257. IEEE Zander S, Nguyen T, Armitage G (2005) Automated traffic classification and application identification using machine learning. In: The IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) l, pp 250–257. IEEE
71.
Zurück zum Zitat Este A, Gringoli F, Salgarelli L (2009) Support vector machines for tcp traffic classification. Comput Netw 53(14):2476–2490MATH Este A, Gringoli F, Salgarelli L (2009) Support vector machines for tcp traffic classification. Comput Netw 53(14):2476–2490MATH
72.
Zurück zum Zitat Park J, Tyan HR, Kuo CCJ (2006) Ga-based internet traffic classification technique for qos provisioning. In: 2006 International Conference on Intelligent Information Hiding and Multimedia, pp 251–254. IEEE Park J, Tyan HR, Kuo CCJ (2006) Ga-based internet traffic classification technique for qos provisioning. In: 2006 International Conference on Intelligent Information Hiding and Multimedia, pp 251–254. IEEE
73.
Zurück zum Zitat Dusi M, Gringoli F, Salgarelli L (2008) Ip traffic classification for qos guarantees: The independence of packets. In: 2008 Proceedings of 17th International Conference on Computer Communications and Networks, pp 1–8. IEEE Dusi M, Gringoli F, Salgarelli L (2008) Ip traffic classification for qos guarantees: The independence of packets. In: 2008 Proceedings of 17th International Conference on Computer Communications and Networks, pp 1–8. IEEE
74.
Zurück zum Zitat Kim H, Claffy KC, Fomenkov M, Barman D, Faloutsos M, Lee K (2008) Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM coNEXT conference, pp 11 ACM Kim H, Claffy KC, Fomenkov M, Barman D, Faloutsos M, Lee K (2008) Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM coNEXT conference, pp 11 ACM
76.
Zurück zum Zitat Carela-Español V, Barlet-Ros P, Bifet A, Fukuda K (2016) A streaming flow-based technique for traffic classification applied to 12 + 1 years of internet traffic. Telecommun Syst 63(2):191–204 Carela-Español V, Barlet-Ros P, Bifet A, Fukuda K (2016) A streaming flow-based technique for traffic classification applied to 12 + 1 years of internet traffic. Telecommun Syst 63(2):191–204
77.
Zurück zum Zitat Mongkolluksamee S, Visoottiviseth V, Fukuda K (2016) Combining communication patterns & traffic patterns to enhance mobile traffic identification performance. J Inform Process 24(2):247–254 Mongkolluksamee S, Visoottiviseth V, Fukuda K (2016) Combining communication patterns & traffic patterns to enhance mobile traffic identification performance. J Inform Process 24(2):247–254
78.
Zurück zum Zitat Allard F, Dubois R, Gompel P, Morel M (2011) Tunneling activities detection using machine learning techniques. J Telecommun Inform Technol 37–42 Allard F, Dubois R, Gompel P, Morel M (2011) Tunneling activities detection using machine learning techniques. J Telecommun Inform Technol 37–42
79.
Zurück zum Zitat Hui D, Sun GL, Li DD (2013) A hybrid method for network traffic classification. In: proceedings of 2013 2nd International Conference on Measurement Information and Control, IEEE, vol 1, pp 653–656 Hui D, Sun GL, Li DD (2013) A hybrid method for network traffic classification. In: proceedings of 2013 2nd International Conference on Measurement Information and Control, IEEE, vol 1, pp 653–656
80.
Zurück zum Zitat Ghofrani F, Keshavarz-Haddad A, Jamshidi A (2018) A new probabilistic classifier based on decomposable models with application to internet traffic. Pattern Recogn 77:1–11 Ghofrani F, Keshavarz-Haddad A, Jamshidi A (2018) A new probabilistic classifier based on decomposable models with application to internet traffic. Pattern Recogn 77:1–11
81.
Zurück zum Zitat Raveendran R, Menon RR (2016) A novel aggregated statistical feature based accurate classification for internet traffic. In: 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE), pp 225–232. IEEE Raveendran R, Menon RR (2016) A novel aggregated statistical feature based accurate classification for internet traffic. In: 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE), pp 225–232. IEEE
82.
Zurück zum Zitat Wang R, Shi L, Jennings B (2013) Ensemble classifier for traffic in presence of changing distributions. In: 2013 IEEE Symposium on Computers and Communications (ISCC), pp 000629–000635, IEEE Wang R, Shi L, Jennings B (2013) Ensemble classifier for traffic in presence of changing distributions. In: 2013 IEEE Symposium on Computers and Communications (ISCC), pp 000629–000635, IEEE
83.
Zurück zum Zitat Divakaran DM, Su L, Liau YS, Thing VLL (2015) Slic: Self-learning intelligent classifier for network traffic. Comput Netw 91:283–297 Divakaran DM, Su L, Liau YS, Thing VLL (2015) Slic: Self-learning intelligent classifier for network traffic. Comput Netw 91:283–297
84.
Zurück zum Zitat Chen X, Zhang J, Xiang Y, Zhou W (2013) Traffic identification in semi-known network environment. In: 2013 IEEE 16th International Conference on Computational Science and Engineering, pp 572–579. IEEE Chen X, Zhang J, Xiang Y, Zhou W (2013) Traffic identification in semi-known network environment. In: 2013 IEEE 16th International Conference on Computational Science and Engineering, pp 572–579. IEEE
85.
Zurück zum Zitat Borgnat P, Dewaele G, Fukuda K, Abry P, Cho K (2009) Seven years and one day: Sketching the evolution of internet traffic. In: IEEE INFOCOM 2009, pages 711–719. IEEE Borgnat P, Dewaele G, Fukuda K, Abry P, Cho K (2009) Seven years and one day: Sketching the evolution of internet traffic. In: IEEE INFOCOM 2009, pages 711–719. IEEE
86.
Zurück zum Zitat Aureli D, Cianfrani A, Diamanti A, Vilchez JMS, Secci S (2020) Going beyond diffserv in ip traffic classification. In: IEEE/IFIP Network Operations and Management Symposium (NOMS) Aureli D, Cianfrani A, Diamanti A, Vilchez JMS, Secci S (2020) Going beyond diffserv in ip traffic classification. In: IEEE/IFIP Network Operations and Management Symposium (NOMS)
87.
Zurück zum Zitat Ibrahim HAH, Al Zuobi ORA, Al-Namari MA, MohamedAli G, Abdalla AAA (2016) Internet traffic classification using machine learning approach: Datasets validation issues. In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC), pp 158–166. IEEE Ibrahim HAH, Al Zuobi ORA, Al-Namari MA, MohamedAli G, Abdalla AAA (2016) Internet traffic classification using machine learning approach: Datasets validation issues. In: 2016 Conference of Basic Sciences and Engineering Studies (SGCAC), pp 158–166. IEEE
94.
Zurück zum Zitat Github - vowpalwabbit/vowpal_wabbit: Vowpal wabbit is a machine learning system which pushes the frontier of machine learning with techniques such as online, hashing, allreduce, reductions, learning2search, active, and interactive learning. https://github.com/VowpalWabbit/vowpal_wabbit, (Accessed on 02/16/2020) Github - vowpalwabbit/vowpal_wabbit: Vowpal wabbit is a machine learning system which pushes the frontier of machine learning with techniques such as online, hashing, allreduce, reductions, learning2search, active, and interactive learning. https://​github.​com/​VowpalWabbit/​vowpal_​wabbit, (Accessed on 02/16/2020)
96.
Zurück zum Zitat Gómez SE, Hernández-Callejo L, Martínez BC, Sánchez-Esguevillas AJ (2019) Exploratory study on class imbalance and solutions for network traffic classification. Neurocomputing 343:100–119 Gómez SE, Hernández-Callejo L, Martínez BC, Sánchez-Esguevillas AJ (2019) Exploratory study on class imbalance and solutions for network traffic classification. Neurocomputing 343:100–119
97.
Zurück zum Zitat Hasibi R, Shokri M, Dehghan M (2019) Augmentation scheme for dealing with imbalanced network traffic classification using deep learning. arXiv:1901.00204 Hasibi R, Shokri M, Dehghan M (2019) Augmentation scheme for dealing with imbalanced network traffic classification using deep learning. arXiv:1901.​00204
99.
Zurück zum Zitat Peng L, Zhang H, Yang B, Su M, Chen Y (Dec 2016) On the effectiveness of packet sampling for early stage traffic identification. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp 468–473 Peng L, Zhang H, Yang B, Su M, Chen Y (Dec 2016) On the effectiveness of packet sampling for early stage traffic identification. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp 468–473
100.
Zurück zum Zitat Landset Sara, Khoshgoftaar Taghi M, Richter Aaron N, Hasanin Tawfiq (2015) A survey of open source tools for machine learning with big data in the hadoop ecosystem. J Big Data 2(1):24 Landset Sara, Khoshgoftaar Taghi M, Richter Aaron N, Hasanin Tawfiq (2015) A survey of open source tools for machine learning with big data in the hadoop ecosystem. J Big Data 2(1):24
101.
Zurück zum Zitat Maier G, Sommer R, Dreger H, Feldmann A, Paxson V, Schneider F (2008) Enriching network security analysis with time travel. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp 183–194 Maier G, Sommer R, Dreger H, Feldmann A, Paxson V, Schneider F (2008) Enriching network security analysis with time travel. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp 183–194
105.
Zurück zum Zitat Deri L, Martinelli M, Bujlow T, Cardigliano A (2014) ndpi: Open-source high-speed deep packet inspection. In: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp 617–622. IEEE Deri L, Martinelli M, Bujlow T, Cardigliano A (2014) ndpi: Open-source high-speed deep packet inspection. In: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp 617–622. IEEE
106.
Zurück zum Zitat Alcock S, Nelson R (2012) Libprotoident: traffic classification using lightweight packet inspection. WAND Network Research Group, Tech. Rep. Alcock S, Nelson R (2012) Libprotoident: traffic classification using lightweight packet inspection. WAND Network Research Group, Tech. Rep.
107.
Zurück zum Zitat Aouini Z, Kortebi A, Ghamri-Doudane Y (2016) Towards understanding residential internet traffic: From packets to services. In: 2016 7th International Conference on the Network of the Future (NOF), pp 1–7. IEEE Aouini Z, Kortebi A, Ghamri-Doudane Y (2016) Towards understanding residential internet traffic: From packets to services. In: 2016 7th International Conference on the Network of the Future (NOF), pp 1–7. IEEE
108.
Zurück zum Zitat Dusi M, Gringoli F, Salgarelli L (2011) Quantifying the accuracy of the ground truth associated with internet traffic traces. Comput Netw 55(5):1158–1167 Dusi M, Gringoli F, Salgarelli L (2011) Quantifying the accuracy of the ground truth associated with internet traffic traces. Comput Netw 55(5):1158–1167
109.
Zurück zum Zitat Alizadeh H, Zúquete A (2016) Traffic classification for managing applications’ networking profiles. Security and Communication Networks 9(14):2557–2575 Alizadeh H, Zúquete A (2016) Traffic classification for managing applications’ networking profiles. Security and Communication Networks 9(14):2557–2575
111.
Zurück zum Zitat Dehghani F, Movahhedinia N, Khayyambashi MR, Kianian S (2010) Real-time traffic classification based on statistical and payload content features. In: 2010 2nd international workshop on intelligent systems and applications, pp 1–4. IEEE Dehghani F, Movahhedinia N, Khayyambashi MR, Kianian S (2010) Real-time traffic classification based on statistical and payload content features. In: 2010 2nd international workshop on intelligent systems and applications, pp 1–4. IEEE
112.
Zurück zum Zitat Le A, Varmarken J, Langhoff S, Shuba A, Gjoka M, Markopoulou A (2015) Antmonitor: A system for monitoring from mobile devices. In: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, pp 15–20 ACM Le A, Varmarken J, Langhoff S, Shuba A, Gjoka M, Markopoulou A (2015) Antmonitor: A system for monitoring from mobile devices. In: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, pp 15–20 ACM
113.
Zurück zum Zitat Razaghpanah A, Vallina-Rodriguez N, Sundaresan S, Kreibich C, Gill P, Allman M, Paxson V (2015) Haystack:, A multi-purpose mobile vantage point in user space. arXiv:1510.01419 Razaghpanah A, Vallina-Rodriguez N, Sundaresan S, Kreibich C, Gill P, Allman M, Paxson V (2015) Haystack:, A multi-purpose mobile vantage point in user space. arXiv:1510.​01419
114.
Zurück zum Zitat Liu Z, Wang R (2016) Mobilegt: A system to collect mobile traffic trace and build the ground truth. In: 2016 26th International telecommunication networks and applications conference (ITNAC), pp 142–144. IEEE Liu Z, Wang R (2016) Mobilegt: A system to collect mobile traffic trace and build the ground truth. In: 2016 26th International telecommunication networks and applications conference (ITNAC), pp 142–144. IEEE
116.
Zurück zum Zitat Abdalla BMA, Jamil HA, Hamdan M, Bassi JS, Ismail I, Marsono MN (2017) Multi-stage feature selection for on-line flow peer-to-peer traffic identification. In: Asian simulation conference, pp 509–523. Springer, Berlin Abdalla BMA, Jamil HA, Hamdan M, Bassi JS, Ismail I, Marsono MN (2017) Multi-stage feature selection for on-line flow peer-to-peer traffic identification. In: Asian simulation conference, pp 509–523. Springer, Berlin
117.
Zurück zum Zitat Peng L, Zhang H, Yang B, Chen Y (2014) Feature evaluation for early stage internet traffic identification. In: International conference on algorithms and architectures for parallel processing, pp 511–525. Springer, Berlin Peng L, Zhang H, Yang B, Chen Y (2014) Feature evaluation for early stage internet traffic identification. In: International conference on algorithms and architectures for parallel processing, pp 511–525. Springer, Berlin
118.
Zurück zum Zitat Aun Y, Manickam S, Karuppayah S (2017) A review on features’ robustness in high diversity mobile traffic classifications. Inter J Commun Netwo Inf Secur 9(2):294 Aun Y, Manickam S, Karuppayah S (2017) A review on features’ robustness in high diversity mobile traffic classifications. Inter J Commun Netwo Inf Secur 9(2):294
119.
Zurück zum Zitat Shafiq M, Yu X, Wang D (2017) Robust feature selection for im applications at early stage traffic classification using machine learning algorithms. In: 2017 IEEE 19th international conference on high performance computing and communications; IEEE 15th international conference on smart city; ieee 3rd international conference on data science and systems (HPCC/SmartCity/DSS), pp 239–245. IEEE Shafiq M, Yu X, Wang D (2017) Robust feature selection for im applications at early stage traffic classification using machine learning algorithms. In: 2017 IEEE 19th international conference on high performance computing and communications; IEEE 15th international conference on smart city; ieee 3rd international conference on data science and systems (HPCC/SmartCity/DSS), pp 239–245. IEEE
120.
Zurück zum Zitat Dainotti A, Pescapé A, Kim H (2011) Traffic classification through joint distributions of packet-level statistics. In: 2011 IEEE Global Telecommunications conference-GLOBECOM 2011, pp 1–6. IEEE Dainotti A, Pescapé A, Kim H (2011) Traffic classification through joint distributions of packet-level statistics. In: 2011 IEEE Global Telecommunications conference-GLOBECOM 2011, pp 1–6. IEEE
121.
Zurück zum Zitat Filiposka S, Mishkovski I (2013) Smartphone user’s traffic characteristics and modelling. Trans Netw Commun 1(1):14–40 Filiposka S, Mishkovski I (2013) Smartphone user’s traffic characteristics and modelling. Trans Netw Commun 1(1):14–40
122.
Zurück zum Zitat Karagiannis T, Papagiannaki K, Faloutsos M (2005) Blinc: multilevel traffic classification in the dark. In: ACM SIGCOMM computer communication review. ACM, vol 35, pp 229–240 Karagiannis T, Papagiannaki K, Faloutsos M (2005) Blinc: multilevel traffic classification in the dark. In: ACM SIGCOMM computer communication review. ACM, vol 35, pp 229–240
123.
Zurück zum Zitat Karagiannis T, Papagiannaki K, Taft N, Faloutsos M (2007) Profiling the end host. In: International Conference on Passive and Active Network Measurement, pp 186–196. Springer, Berlin Karagiannis T, Papagiannaki K, Taft N, Faloutsos M (2007) Profiling the end host. In: International Conference on Passive and Active Network Measurement, pp 186–196. Springer, Berlin
124.
Zurück zum Zitat Cao J, Chen A, Widjaja I, Zhou N (2008) Online identification of applications using statistical behavior analysis. In: IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, pp 1–6. IEEE Cao J, Chen A, Widjaja I, Zhou N (2008) Online identification of applications using statistical behavior analysis. In: IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, pp 1–6. IEEE
125.
Zurück zum Zitat Meiss M, Menczer F, Vespignani A (2011) Properties and evolution of internet traffic networks from anonymized flow data. ACM Trans Internet Technol (TOIT) 10(4):15 Meiss M, Menczer F, Vespignani A (2011) Properties and evolution of internet traffic networks from anonymized flow data. ACM Trans Internet Technol (TOIT) 10(4):15
126.
Zurück zum Zitat Lee SW, Park JS, Lee HS, Kim MS (2011) A study on smart-phone traffic analysis. In: 2011 13th Asia-Pacific Network Operations and Management Symposium, pp 1–7. IEEE Lee SW, Park JS, Lee HS, Kim MS (2011) A study on smart-phone traffic analysis. In: 2011 13th Asia-Pacific Network Operations and Management Symposium, pp 1–7. IEEE
127.
Zurück zum Zitat Chung JY, Choi Y, Park B, Hong JWK (2011) Measurement analysis of mobile traffic in enterprise networks. In: 2011 13th Asia-Pacific Network Operations and Management Symposium, pp 1–4. IEEE Chung JY, Choi Y, Park B, Hong JWK (2011) Measurement analysis of mobile traffic in enterprise networks. In: 2011 13th Asia-Pacific Network Operations and Management Symposium, pp 1–4. IEEE
128.
Zurück zum Zitat Mitevski B, Filiposka S (2013) Smartphone traffic review. In: International Conference on ICT Innovations, pp 291–301. Springer, Berlin Mitevski B, Filiposka S (2013) Smartphone traffic review. In: International Conference on ICT Innovations, pp 291–301. Springer, Berlin
129.
Zurück zum Zitat Okabe T, Kitamura T, Shizuno T (2006) Statistical traffic identification method based on flow-level behavior for fair voip service. In: 1st IEEE workshop on VoIP management and security, 2006., pp 35–40. IEEE Okabe T, Kitamura T, Shizuno T (2006) Statistical traffic identification method based on flow-level behavior for fair voip service. In: 1st IEEE workshop on VoIP management and security, 2006., pp 35–40. IEEE
130.
Zurück zum Zitat Hu Y, Chiu DM, Lui JCS (2008) Application identification based on network behavioral profiles. In: 2008 16th interntional workshop on quality of service, pp 219–228. IEEE Hu Y, Chiu DM, Lui JCS (2008) Application identification based on network behavioral profiles. In: 2008 16th interntional workshop on quality of service, pp 219–228. IEEE
131.
Zurück zum Zitat Yu K, Liu Y, Qing L, Wang B, Cheng Y (2018) Positive and unlabeled learning for user behavior analysis based on mobile internet traffic data. IEEE Access 6:37568–37580 Yu K, Liu Y, Qing L, Wang B, Cheng Y (2018) Positive and unlabeled learning for user behavior analysis based on mobile internet traffic data. IEEE Access 6:37568–37580
132.
Zurück zum Zitat Moore A, Zuev D, Crogan M (2013) Discriminators for use in flow-based classification Technical report Moore A, Zuev D, Crogan M (2013) Discriminators for use in flow-based classification Technical report
133.
Zurück zum Zitat Haffner P, Sen S, Spatscheck O, Wang D (2005) Acas: automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pp 197–202. ACM Haffner P, Sen S, Spatscheck O, Wang D (2005) Acas: automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, pp 197–202. ACM
134.
Zurück zum Zitat Conti M, Mancini LV, Spolaor R, Verde NV (2015) Analyzing android encrypted network traffic to identify user actions. IEEE Trans Inf Forensics Secur 11(1):114–125 Conti M, Mancini LV, Spolaor R, Verde NV (2015) Analyzing android encrypted network traffic to identify user actions. IEEE Trans Inf Forensics Secur 11(1):114–125
135.
Zurück zum Zitat Acar A, Fereidooni H, Abera T, Sikder AK, Miettinen M, Aksu H, Conti M, Sadeghi AR, Uluagac AS (2018) Peek-a-boo:, I see your smart home activities, even encrypted!. arXiv:1808.02741 Acar A, Fereidooni H, Abera T, Sikder AK, Miettinen M, Aksu H, Conti M, Sadeghi AR, Uluagac AS (2018) Peek-a-boo:, I see your smart home activities, even encrypted!. arXiv:1808.​02741
136.
Zurück zum Zitat Xu Q, Andrews T, Liao Y, Miskovic S, Mao ZM, Baldi M, Nucci A (2014) Flowr: a self-learning system for classifying mobileapplication traffic. In: ACM SIGMETRICS Performance Evaluation Review, vol 42, pp 569–570 Xu Q, Andrews T, Liao Y, Miskovic S, Mao ZM, Baldi M, Nucci A (2014) Flowr: a self-learning system for classifying mobileapplication traffic. In: ACM SIGMETRICS Performance Evaluation Review, vol 42, pp 569–570
137.
Zurück zum Zitat Hur M, Kim MS (2012) Towards smart phone traffic classification. In: 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp 1–4. IEEE Hur M, Kim MS (2012) Towards smart phone traffic classification. In: 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp 1–4. IEEE
138.
Zurück zum Zitat Murgia A, Ghidini G, Emmons SP, Bellavista P (2016) Lightweight internet traffic classification: A subject-based solution with word embeddings. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp 1–8. IEEE Murgia A, Ghidini G, Emmons SP, Bellavista P (2016) Lightweight internet traffic classification: A subject-based solution with word embeddings. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp 1–8. IEEE
139.
Zurück zum Zitat Gonzalez R, Manco F, Garcia-Duran A, Mendes J, Huici F, Niccolini S, Niepert M (2017) Net2vec:, Deep learning for the network. arXiv:1705.03881 Gonzalez R, Manco F, Garcia-Duran A, Mendes J, Huici F, Niccolini S, Niepert M (2017) Net2vec:, Deep learning for the network. arXiv:1705.​03881
140.
Zurück zum Zitat Goo YH, Shim KS, Lee SK, Kim MS (2016) Payload signature structure for accurate application traffic classification. In: 2016 18th Asia-pacific network operations and management symposium (APNOMS), pp 1–4. IEEE Goo YH, Shim KS, Lee SK, Kim MS (2016) Payload signature structure for accurate application traffic classification. In: 2016 18th Asia-pacific network operations and management symposium (APNOMS), pp 1–4. IEEE
141.
Zurück zum Zitat Nowak J, Korytkowski M, Nowicki R, Scherer R, Siwocha A (2018) Random forests for profiling computer network users. In: International Conference on Artificial Intelligence and Soft Computing, pp 734–739. Springer, Berlin Nowak J, Korytkowski M, Nowicki R, Scherer R, Siwocha A (2018) Random forests for profiling computer network users. In: International Conference on Artificial Intelligence and Soft Computing, pp 734–739. Springer, Berlin
142.
Zurück zum Zitat Zhang Z, Zhang Z, Lee PPC, Liu Y, Xie G (2014) Toward unsupervised protocol feature word extraction. IEEE J Sel Area Commun 32(10):1894–1906 Zhang Z, Zhang Z, Lee PPC, Liu Y, Xie G (2014) Toward unsupervised protocol feature word extraction. IEEE J Sel Area Commun 32(10):1894–1906
143.
Zurück zum Zitat Maier G, Schneider F, Feldmann A (2010) A first look at mobile hand-held device traffic. In: International Conference on Passive and Active Network Measurement, pp 161–170. Springer, Berlin Maier G, Schneider F, Feldmann A (2010) A first look at mobile hand-held device traffic. In: International Conference on Passive and Active Network Measurement, pp 161–170. Springer, Berlin
144.
Zurück zum Zitat Chen Z, Yu B, Zhang Y, Zhang J, Xu J (2016) Automatic mobile application traffic identification by convolutional neural networks. In: 2016 IEEE Trustcom/bigdataSE/ISPA, pp 301–307. IEEE Chen Z, Yu B, Zhang Y, Zhang J, Xu J (2016) Automatic mobile application traffic identification by convolutional neural networks. In: 2016 IEEE Trustcom/bigdataSE/ISPA, pp 301–307. IEEE
145.
Zurück zum Zitat Chen Z, He K, Li J, Geng Y (2017) Seq2img: A sequence-to-image based approach towards ip traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), pp 1271–1276. IEEE Chen Z, He K, Li J, Geng Y (2017) Seq2img: A sequence-to-image based approach towards ip traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), pp 1271–1276. IEEE
146.
Zurück zum Zitat Wang W, Sheng Y, Wang J, Zeng X, Ye X, Huang Y, Zhu M (2017) Hast-ids: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6:1792–1806 Wang W, Sheng Y, Wang J, Zeng X, Ye X, Huang Y, Zhu M (2017) Hast-ids: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6:1792–1806
147.
Zurück zum Zitat Li Z, Qin Z, Huang Z, Yang X, Ye S (2017) Intrusion detection using convolutional neural networks for representation learning. In: International conference on neural information processing, pp 858–866. Springer Li Z, Qin Z, Huang Z, Yang X, Ye S (2017) Intrusion detection using convolutional neural networks for representation learning. In: International conference on neural information processing, pp 858–866. Springer
148.
Zurück zum Zitat Wang Z (2015) The applications of deep learning on traffic identification, BlackHat USA. pp 24 Wang Z (2015) The applications of deep learning on traffic identification, BlackHat USA. pp 24
149.
Zurück zum Zitat Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International conference on information networking (ICOIN), pp 712–717. IEEE Wang W, Zhu M, Zeng X, Ye X, Sheng Y (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International conference on information networking (ICOIN), pp 712–717. IEEE
150.
Zurück zum Zitat Salman O, Elhajj IH, Chehab A, Kayssi A (2018) A multi-level internet traffic classifier using deep learning. In: 2018 9th International conference on the network of the future (NOF), pp 68–75. IEEE Salman O, Elhajj IH, Chehab A, Kayssi A (2018) A multi-level internet traffic classifier using deep learning. In: 2018 9th International conference on the network of the future (NOF), pp 68–75. IEEE
151.
Zurück zum Zitat Aceto G, Ciuonzo D, Montieri A, Pescapé A (2018) Mobile encrypted traffic classification using deep learning. In: 2018 Network traffic measurement and analysis conference (TMA), pp 1–8. IEEE Aceto G, Ciuonzo D, Montieri A, Pescapé A (2018) Mobile encrypted traffic classification using deep learning. In: 2018 Network traffic measurement and analysis conference (TMA), pp 1–8. IEEE
152.
Zurück zum Zitat Liu Z, Wang R, Japkowicz N, Cai Y, Tang D, Cai X (2019) Mobile app traffic flow feature extraction and selection for improving classification robustness. J Netw Comput Appl 125:190–208 Liu Z, Wang R, Japkowicz N, Cai Y, Tang D, Cai X (2019) Mobile app traffic flow feature extraction and selection for improving classification robustness. J Netw Comput Appl 125:190–208
153.
Zurück zum Zitat Dai S, Tongaonkar A, Wang X, Nucci A, Song D (2013) Networkprofiler: Towards automatic fingerprinting of android apps. In: 2013 Proceedings IEEE INFOCOM, pp 809–817. IEEE Dai S, Tongaonkar A, Wang X, Nucci A, Song D (2013) Networkprofiler: Towards automatic fingerprinting of android apps. In: 2013 Proceedings IEEE INFOCOM, pp 809–817. IEEE
154.
Zurück zum Zitat Schmidt B, Al-Fuqaha A, Gupta A, Kountanis D (2017) Optimizing an artificial immune system algorithm in support of flow-based internet traffic classification. Appl Soft Comput 54:1–22 Schmidt B, Al-Fuqaha A, Gupta A, Kountanis D (2017) Optimizing an artificial immune system algorithm in support of flow-based internet traffic classification. Appl Soft Comput 54:1–22
155.
Zurück zum Zitat Mongkolluksamee S, Visoottiviseth V, Fukuda K (2015) Enhancing the performance of mobile traffic identification with communication patterns. In: 2015 IEEE 39th annual computer software and applications conference, IEEE, vol 2, pp 336–345 Mongkolluksamee S, Visoottiviseth V, Fukuda K (2015) Enhancing the performance of mobile traffic identification with communication patterns. In: 2015 IEEE 39th annual computer software and applications conference, IEEE, vol 2, pp 336–345
156.
Zurück zum Zitat Holeña M, Pulc P, Kopp M Classification methods for internet applications Holeña M, Pulc P, Kopp M Classification methods for internet applications
157.
Zurück zum Zitat Bishop CM (2006) Pattern recognition and machine learning springer Bishop CM (2006) Pattern recognition and machine learning springer
158.
Zurück zum Zitat Theodoridis S, Koutroumbas K (2009) Pattern recognition–fourth edition Theodoridis S, Koutroumbas K (2009) Pattern recognition–fourth edition
160.
Zurück zum Zitat Yuan Z, Wang C (2016) An improved network traffic classification algorithm based on hadoop decision tree. In: IEEE International conference of online analysis and computing science (ICOACS), pp 53–56. IEEE Yuan Z, Wang C (2016) An improved network traffic classification algorithm based on hadoop decision tree. In: IEEE International conference of online analysis and computing science (ICOACS), pp 53–56. IEEE
161.
Zurück zum Zitat Hu LT, Zhang LJ (2012) Real-time internet traffic identification based on decision tree. In: World Automation Congress 2012, pp 1–3. IEEE Hu LT, Zhang LJ (2012) Real-time internet traffic identification based on decision tree. In: World Automation Congress 2012, pp 1–3. IEEE
162.
Zurück zum Zitat Lingyu J, Yang L, Bailing W, Hongri L, Guodong X (2017) A hierarchical classification approach for tor anonymous traffic. In: 2017 IEEE 9th International conference on communication software and networks (ICCSN), pp 239–243. IEEE Lingyu J, Yang L, Bailing W, Hongri L, Guodong X (2017) A hierarchical classification approach for tor anonymous traffic. In: 2017 IEEE 9th International conference on communication software and networks (ICCSN), pp 239–243. IEEE
163.
Zurück zum Zitat Dias KL, Pongelupe MA, Caminhas WM, Errico LD (2019) An innovative approach for real-time network traffic classification. Comput Netw 158:143–157 Dias KL, Pongelupe MA, Caminhas WM, Errico LD (2019) An innovative approach for real-time network traffic classification. Comput Netw 158:143–157
164.
Zurück zum Zitat Ning J, Yang M, Cheng S, Dong Q, Xiong H (2011) An efficient svm-based method for multi-class network traffic classification. In: 30th IEEE International performance computing and communications conference, pp 1–8. IEEE Ning J, Yang M, Cheng S, Dong Q, Xiong H (2011) An efficient svm-based method for multi-class network traffic classification. In: 30th IEEE International performance computing and communications conference, pp 1–8. IEEE
165.
Zurück zum Zitat Hong Y, Huang C, Nandy B, Seddigh N (2015) Iterative-tuning support vector machine for network traffic classification. In: IFIP/IEEE International symposium on integrated network management (IM), pp 458–466. IEEE Hong Y, Huang C, Nandy B, Seddigh N (2015) Iterative-tuning support vector machine for network traffic classification. In: IFIP/IEEE International symposium on integrated network management (IM), pp 458–466. IEEE
166.
Zurück zum Zitat Sabzekar M, Moghaddam MHY, Naghibzadeh M (2013) Tcp traffic classification using relaxed constraints support vector machines. In: Integration of practice-oriented knowledge technology: Trends and prospectives, pp 129–139. Springer, Berlin Sabzekar M, Moghaddam MHY, Naghibzadeh M (2013) Tcp traffic classification using relaxed constraints support vector machines. In: Integration of practice-oriented knowledge technology: Trends and prospectives, pp 129–139. Springer, Berlin
167.
Zurück zum Zitat Zhou W, Dong L, Bic L, Zhou M, Chen L (2011) Internet traffic classification using feed-forward neural network. In: 2011 International conference on computational problem-solving (ICCP), pp 641–646. IEEE Zhou W, Dong L, Bic L, Zhou M, Chen L (2011) Internet traffic classification using feed-forward neural network. In: 2011 International conference on computational problem-solving (ICCP), pp 641–646. IEEE
168.
Zurück zum Zitat Dong S, Zhou D, Zhou W, Ding W, Gong J (2013) Research on network traffic identification based on improved bp neural network. Appl Math & Inform Sci 7(1):389–398 Dong S, Zhou D, Zhou W, Ding W, Gong J (2013) Research on network traffic identification based on improved bp neural network. Appl Math & Inform Sci 7(1):389–398
169.
Zurück zum Zitat Dong S, Li R (2019) Traffic identification method based on multiple probabilistic neural network model. Neural Comput & Appl 31(2):473–487 Dong S, Li R (2019) Traffic identification method based on multiple probabilistic neural network model. Neural Comput & Appl 31(2):473–487
170.
Zurück zum Zitat Smit D, Millar K, Page C, Cheng A, Chew HG, Lim CC (2017) Looking deeper: Using deep learning to identify internet communications traffic. In: 2017 Australasian conference of undergraduate research (ACUR) Smit D, Millar K, Page C, Cheng A, Chew HG, Lim CC (2017) Looking deeper: Using deep learning to identify internet communications traffic. In: 2017 Australasian conference of undergraduate research (ACUR)
171.
Zurück zum Zitat Liu Y, Zhang S, Bo D, Li X, Yipeng W (2018) A cascade forest approach to application classification of mobile traces. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp 1–6. IEEE Liu Y, Zhang S, Bo D, Li X, Yipeng W (2018) A cascade forest approach to application classification of mobile traces. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp 1–6. IEEE
172.
Zurück zum Zitat Fadlullah ZM, Tang F, Mao B, Kato N, Akashi O, Inoue T, Mizutani K (2017) State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Commun Surv & Tut 19(4):2432–2455 Fadlullah ZM, Tang F, Mao B, Kato N, Akashi O, Inoue T, Mizutani K (2017) State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Commun Surv & Tut 19(4):2432–2455
173.
Zurück zum Zitat Hahn D, Apthorpe N, Feamster N (2018) Detecting compressed cleartext traffic from consumer internet of things devices. arXiv:1805.02722 Hahn D, Apthorpe N, Feamster N (2018) Detecting compressed cleartext traffic from consumer internet of things devices. arXiv:1805.​02722
174.
Zurück zum Zitat Vinayakumar R, Soman KP, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp 1222–1228. IEEE Vinayakumar R, Soman KP, Poornachandran P (2017) Applying convolutional neural network for network intrusion detection. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp 1222–1228. IEEE
175.
Zurück zum Zitat Zhang C, Patras P, Haddadi H (2019) Deep learning in mobile and wireless networking: A survey. IEEE Communications Surveys & Tutorials Zhang C, Patras P, Haddadi H (2019) Deep learning in mobile and wireless networking: A survey. IEEE Communications Surveys & Tutorials
176.
Zurück zum Zitat Gugelmann D (2017) Deep learning and machine learning for network traffic analysis. SIGS Technology Conference 2017 Hacking Day Gugelmann D (2017) Deep learning and machine learning for network traffic analysis. SIGS Technology Conference 2017 Hacking Day
177.
Zurück zum Zitat Lim HK, Kim JB, Heo JS, Kim K, Hong YG, Han YH (2019) Packet-based network traffic classification using deep learning. In: 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp 046–051. IEEE Lim HK, Kim JB, Heo JS, Kim K, Hong YG, Han YH (2019) Packet-based network traffic classification using deep learning. In: 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp 046–051. IEEE
178.
Zurück zum Zitat Aceto G, Ciuonzo D, Montieri A, Pescapé A (2019) Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag Aceto G, Ciuonzo D, Montieri A, Pescapé A (2019) Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag
179.
Zurück zum Zitat LeCun Y, Bottou L, Bengio Y, Haffner P, et al. (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324 LeCun Y, Bottou L, Bengio Y, Haffner P, et al. (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278–2324
180.
Zurück zum Zitat Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105 Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105
182.
Zurück zum Zitat Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1–9 Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1–9
183.
Zurück zum Zitat Rezaei S, Liu X (2018) How to achieve high classification accuracy with just a few labels:, A semi-supervised approach using sampled packets. arXiv:1812.09761 Rezaei S, Liu X (2018) How to achieve high classification accuracy with just a few labels:, A semi-supervised approach using sampled packets. arXiv:1812.​09761
184.
Zurück zum Zitat Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5:18042–18050 Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5:18042–18050
185.
Zurück zum Zitat He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
187.
Zurück zum Zitat Munther A, Othman RR, Alsaadi AS, Mohammed Anbar (2016) A performance study of hidden markov model and random forest in internet traffic classification. In: Information science and applications (ICISA) 2016, pp 319–329. Springer, Berlin Munther A, Othman RR, Alsaadi AS, Mohammed Anbar (2016) A performance study of hidden markov model and random forest in internet traffic classification. In: Information science and applications (ICISA) 2016, pp 319–329. Springer, Berlin
188.
Zurück zum Zitat Dainotti A, Pescape A, Rossi PSS, Iannello G, Palmieri F, Ventre G (2006) Qrp07-2: An hmm approach to internet traffic modeling. In: IEEE Globecom 2006, pp 1–6. IEEE Dainotti A, Pescape A, Rossi PSS, Iannello G, Palmieri F, Ventre G (2006) Qrp07-2: An hmm approach to internet traffic modeling. In: IEEE Globecom 2006, pp 1–6. IEEE
189.
Zurück zum Zitat Maia JEB, Holanda Filho R (2010) Internet traffic classification using a hidden markov model. In: 2010 10th International conference on hybrid intelligent systems, pp 37–42. IEEE Maia JEB, Holanda Filho R (2010) Internet traffic classification using a hidden markov model. In: 2010 10th International conference on hybrid intelligent systems, pp 37–42. IEEE
190.
Zurück zum Zitat Gómez SE, Martínez BC, Sánchez-Esguevillas AJ, Hernández Callejo L (2017) Ensemble network traffic classification: Algorithm comparison and novel ensemble scheme proposal. Comput Netw 127:68–80 Gómez SE, Martínez BC, Sánchez-Esguevillas AJ, Hernández Callejo L (2017) Ensemble network traffic classification: Algorithm comparison and novel ensemble scheme proposal. Comput Netw 127:68–80
191.
Zurück zum Zitat Wang C, Tongge X, Qin X (2015) Network traffic classification with improved random forest. In: 2015 11th International conference on computational intelligence and security (CIS), pp 78–81. IEEE Wang C, Tongge X, Qin X (2015) Network traffic classification with improved random forest. In: 2015 11th International conference on computational intelligence and security (CIS), pp 78–81. IEEE
192.
Zurück zum Zitat Sun G, Liang L, Chen T, Xiao F, Lang F (2018) Network traffic classification based on transfer learning. Comput & Electr Eng 69:920–927 Sun G, Liang L, Chen T, Xiao F, Lang F (2018) Network traffic classification based on transfer learning. Comput & Electr Eng 69:920–927
193.
Zurück zum Zitat Shafiq M, Yu X, Wang D (2017) Network traffic classification using machine learning algorithms. In: International conference on intelligent and interactive systems and applications, pp 621–627. Springer, Berlin Shafiq M, Yu X, Wang D (2017) Network traffic classification using machine learning algorithms. In: International conference on intelligent and interactive systems and applications, pp 621–627. Springer, Berlin
194.
Zurück zum Zitat Michael AKJ, Valla E, Neggatu NS, Moore AW (2017) Network traffic classification via neural Technical report. University of Cambridge, Computer Laboratory Michael AKJ, Valla E, Neggatu NS, Moore AW (2017) Network traffic classification via neural Technical report. University of Cambridge, Computer Laboratory
195.
Zurück zum Zitat Wang B, Zhang J, Zhang Z, Luo W, Xia D (2016) Traffic identification in big internet data. In: Big Data Concepts, Theories, and Applications, pp 129–156. Springer, Berlin Wang B, Zhang J, Zhang Z, Luo W, Xia D (2016) Traffic identification in big internet data. In: Big Data Concepts, Theories, and Applications, pp 129–156. Springer, Berlin
196.
Zurück zum Zitat Shafiq M, Yu X, Bashir AK, Chaudhry HN, Wang D (2018) A machine learning approach for feature selection traffic classification using security analysis. J Supercomput 74(10):4867–4892 Shafiq M, Yu X, Bashir AK, Chaudhry HN, Wang D (2018) A machine learning approach for feature selection traffic classification using security analysis. J Supercomput 74(10):4867–4892
197.
Zurück zum Zitat Usama M, Qadir J, Raza A, Arif H, Yau KLA, Elkhatib Y, Hussain A, Al-Fuqaha A (2019) Unsupervised machine learning for networking: Techniques, applications and research challenges. IEEE Access 7:65579–65615 Usama M, Qadir J, Raza A, Arif H, Yau KLA, Elkhatib Y, Hussain A, Al-Fuqaha A (2019) Unsupervised machine learning for networking: Techniques, applications and research challenges. IEEE Access 7:65579–65615
198.
Zurück zum Zitat Kim J, Sim A, Tierney B, Suh S, Kim I (2019) Multivariate network traffic analysis using clustered patterns. Computing 101(4):339–361MathSciNet Kim J, Sim A, Tierney B, Suh S, Kim I (2019) Multivariate network traffic analysis using clustered patterns. Computing 101(4):339–361MathSciNet
199.
Zurück zum Zitat Conti M, Mancini LV, Spolaor R, Verde NV (2015) Can’t you hear me knocking: Identification of user actions on android apps via traffic analysis. In: Proceedings of the 5th ACM Conference on data and application security and privacy, pp 297–304 ACM Conti M, Mancini LV, Spolaor R, Verde NV (2015) Can’t you hear me knocking: Identification of user actions on android apps via traffic analysis. In: Proceedings of the 5th ACM Conference on data and application security and privacy, pp 297–304 ACM
200.
Zurück zum Zitat Dewaele G, Himura Y, Borgnat P, Fukuda K, Abry P, Michel O, Fontugne R, Cho K, Esaki H (2010) Unsupervised host behavior classification from connection patterns. Int J Netw Manag 20(5):317–337 Dewaele G, Himura Y, Borgnat P, Fukuda K, Abry P, Michel O, Fontugne R, Cho K, Esaki H (2010) Unsupervised host behavior classification from connection patterns. Int J Netw Manag 20(5):317–337
201.
Zurück zum Zitat Erman J, Mahanti A, Arlitt M, Williamson C (2007) Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International conference on World Wide Web, pp 883–892 ACM Erman J, Mahanti A, Arlitt M, Williamson C (2007) Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International conference on World Wide Web, pp 883–892 ACM
202.
Zurück zum Zitat Yuan J, Li Z, Yuan R (2008) Information entropy based clustering method for unsupervised internet traffic classification. In: 2008 IEEE International conference on communications, pp 1588–1592. IEEE Yuan J, Li Z, Yuan R (2008) Information entropy based clustering method for unsupervised internet traffic classification. In: 2008 IEEE International conference on communications, pp 1588–1592. IEEE
203.
Zurück zum Zitat Yang C, Wang F, Huang B (2009) Internet traffic classification using dbscan. In: 2009 WASE International conference on information engineering, IEEE, vol 2, pp 163–166 Yang C, Wang F, Huang B (2009) Internet traffic classification using dbscan. In: 2009 WASE International conference on information engineering, IEEE, vol 2, pp 163–166
204.
Zurück zum Zitat Zhang J, Qian Z, Shou G, Hu Y (2010) Traffic identification method based on on-line density based spatial clustering algorithm. In: 2010 2nd IEEE International conference on network infrastructure and digital content, pp 270–274. IEEE Zhang J, Qian Z, Shou G, Hu Y (2010) Traffic identification method based on on-line density based spatial clustering algorithm. In: 2010 2nd IEEE International conference on network infrastructure and digital content, pp 270–274. IEEE
205.
Zurück zum Zitat Bernaille L, Teixeira R, Salamatian K (2006) Early application identification. In: 2006 Proceedings of the ACM coNEXT conference, pp 6. ACM Bernaille L, Teixeira R, Salamatian K (2006) Early application identification. In: 2006 Proceedings of the ACM coNEXT conference, pp 6. ACM
206.
Zurück zum Zitat Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamatian K (2006) Traffic classification on the fly. ACM SIGCOMM Comput Commun Rev 36(2):23–26 Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamatian K (2006) Traffic classification on the fly. ACM SIGCOMM Comput Commun Rev 36(2):23–26
207.
Zurück zum Zitat Zhang M, Zhang H, Zhang B, Lu G (2012) Encrypted traffic classification based on an improved clustering algorithm. In: International conference on trustworthy computing and services, pp 124–131. Springer, Berlin Zhang M, Zhang H, Zhang B, Lu G (2012) Encrypted traffic classification based on an improved clustering algorithm. In: International conference on trustworthy computing and services, pp 124–131. Springer, Berlin
208.
Zurück zum Zitat Höchst J, Baumgärtner L, Hollick M, Freisleben B (2017) Unsupervised traffic flow classification using a neural autoencoder. In: 2017 IEEE 42Nd Conference on local computer networks (LCN), pp 523–526. IEEE Höchst J, Baumgärtner L, Hollick M, Freisleben B (2017) Unsupervised traffic flow classification using a neural autoencoder. In: 2017 IEEE 42Nd Conference on local computer networks (LCN), pp 523–526. IEEE
209.
Zurück zum Zitat Li D, Zhu Y, Lin W (2017) Traffic identification of mobile apps based on variational autoencoder network. In: 2017 13th International conference on computational intelligence and security (CIS), pp 287–291. IEEE Li D, Zhu Y, Lin W (2017) Traffic identification of mobile apps based on variational autoencoder network. In: 2017 13th International conference on computational intelligence and security (CIS), pp 287–291. IEEE
210.
Zurück zum Zitat Liu S, Hu J, Hao S, Song T (2016) Improved em method for internet traffic classification. In: 2016 8th International conference on knowledge and smart technology (KST), pp 13–17. IEEE Liu S, Hu J, Hao S, Song T (2016) Improved em method for internet traffic classification. In: 2016 8th International conference on knowledge and smart technology (KST), pp 13–17. IEEE
211.
Zurück zum Zitat Zhao Y, Chen J, You G, Teng T (2016) Network traffic classification model based on mdl criterion. In: Advanced multimedia and ubiquitous engineering, pp 1–8. Springer, Berlin Zhao Y, Chen J, You G, Teng T (2016) Network traffic classification model based on mdl criterion. In: Advanced multimedia and ubiquitous engineering, pp 1–8. Springer, Berlin
212.
Zurück zum Zitat Wang Y, Xiang Y, Zhang J, Zhou W, Wei G, Yang LT (2013) Internet traffic classification using constrained clustering. IEEE Trans Parall Distr Syst 25(11):2932–2943 Wang Y, Xiang Y, Zhang J, Zhou W, Wei G, Yang LT (2013) Internet traffic classification using constrained clustering. IEEE Trans Parall Distr Syst 25(11):2932–2943
213.
Zurück zum Zitat Laner M, Svoboda P, Rupp M (2014) Detecting m2m traffic in mobile cellular networks. In: IWSSIP 2014 Proceedings, pp 159–162. IEEE Laner M, Svoboda P, Rupp M (2014) Detecting m2m traffic in mobile cellular networks. In: IWSSIP 2014 Proceedings, pp 159–162. IEEE
214.
Zurück zum Zitat Szabó G, Szüle J, Turányi Z, Pongrácz G (2012) Multi-level machine learning traffic classification system. In: The Eleventh International Conference on Networks, pp 69–77 Szabó G, Szüle J, Turányi Z, Pongrácz G (2012) Multi-level machine learning traffic classification system. In: The Eleventh International Conference on Networks, pp 69–77
215.
Zurück zum Zitat Shaikh ZA, Harkut DG (2015) A novel framework for network traffic classification using unknown flow detection. In: 2015 Fifth International conference on communication systems and network technologies, pp 116–121. IEEE Shaikh ZA, Harkut DG (2015) A novel framework for network traffic classification using unknown flow detection. In: 2015 Fifth International conference on communication systems and network technologies, pp 116–121. IEEE
216.
Zurück zum Zitat Zhang J, Chen X, Xiang Y, Zhou W, Wu J (2015) Robust network traffic classification. IEEE/ACM Trans Netw (TON) 23(4):1257–1270 Zhang J, Chen X, Xiang Y, Zhou W, Wu J (2015) Robust network traffic classification. IEEE/ACM Trans Netw (TON) 23(4):1257–1270
217.
Zurück zum Zitat Zhang J, Chen C, Xiang Y, Zhou W (2013) Robust network traffic identification with unknown applications. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp 405–414 ACM Zhang J, Chen C, Xiang Y, Zhou W (2013) Robust network traffic identification with unknown applications. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp 405–414 ACM
218.
Zurück zum Zitat Zhang J, Chen X, Xiang Y, Zhou W (2013) Zero-day traffic identification. In: Cyberspace Safety and Security, pp 213–227. Springer, Berlin Zhang J, Chen X, Xiang Y, Zhou W (2013) Zero-day traffic identification. In: Cyberspace Safety and Security, pp 213–227. Springer, Berlin
219.
Zurück zum Zitat Li W, Moore AW (2007) A machine learning approach for efficient traffic classification. In: 2007 15th International symposium on modeling, analysis, and simulation of computer and telecommunication systems, pp 310–317. IEEE Li W, Moore AW (2007) A machine learning approach for efficient traffic classification. In: 2007 15th International symposium on modeling, analysis, and simulation of computer and telecommunication systems, pp 310–317. IEEE
220.
Zurück zum Zitat Zhang J, Chen C, Xiang Y, Zhou W, Vasilakos AV (2013) An effective network traffic classification method with unknown flow detection. IEEE Trans Netw Serv Manag 10(2):133–147 Zhang J, Chen C, Xiang Y, Zhou W, Vasilakos AV (2013) An effective network traffic classification method with unknown flow detection. IEEE Trans Netw Serv Manag 10(2):133–147
221.
Zurück zum Zitat Zhang J, Xiang Y, Zhou W, Wang Y (2013) Unsupervised traffic classification using flow statistical properties and ip packet payload. J Comput Syst Sci 79(5):573–585MathSciNet Zhang J, Xiang Y, Zhou W, Wang Y (2013) Unsupervised traffic classification using flow statistical properties and ip packet payload. J Comput Syst Sci 79(5):573–585MathSciNet
222.
Zurück zum Zitat Bakhshi T, Ghita B (2016) On internet traffic classification: a two-phased machine learning approach, J Comput Netw Commun, pp 2016 Bakhshi T, Ghita B (2016) On internet traffic classification: a two-phased machine learning approach, J Comput Netw Commun, pp 2016
223.
Zurück zum Zitat Glennan T, Leckie C, Erfani SM (2016) Improved classification of known and unknown network traffic flows using semi-supervised machine learning. In: Australasian conference on information security and privacy, pp 493–501. Springer, Berlin Glennan T, Leckie C, Erfani SM (2016) Improved classification of known and unknown network traffic flows using semi-supervised machine learning. In: Australasian conference on information security and privacy, pp 493–501. Springer, Berlin
224.
Zurück zum Zitat Amaral P, Dinis J, Pinto P, Bernardo L, Tavares J, Mamede HS (2016) Machine learning in software defined networks: Data collection and traffic classification. In: 2016 IEEE 24th International conference on network protocols (ICNP), pp 1–5. IEEE Amaral P, Dinis J, Pinto P, Bernardo L, Tavares J, Mamede HS (2016) Machine learning in software defined networks: Data collection and traffic classification. In: 2016 IEEE 24th International conference on network protocols (ICNP), pp 1–5. IEEE
225.
Zurück zum Zitat Fahad A, Almalawi A, Tari Z, Alharthi K, Al Qahtani FS, Cheriet M (2019) Semtra: a semi-supervised approach to traffic flow labeling with minimal human effort. Pattern Recogn 91:1–12 Fahad A, Almalawi A, Tari Z, Alharthi K, Al Qahtani FS, Cheriet M (2019) Semtra: a semi-supervised approach to traffic flow labeling with minimal human effort. Pattern Recogn 91:1–12
226.
Zurück zum Zitat Rotsos C, Gael JV, Moore AW, Ghahramani Z (2010) Probabilistic graphical models for semi-supervised traffic classification. In: Proceedings of the 6th International wireless communications and mobile computing conference, pp 752–757 ACM Rotsos C, Gael JV, Moore AW, Ghahramani Z (2010) Probabilistic graphical models for semi-supervised traffic classification. In: Proceedings of the 6th International wireless communications and mobile computing conference, pp 752–757 ACM
227.
Zurück zum Zitat Erman J, Mahanti A, Arlitt M, Cohen I, Williamson C (2007) Offline/realtime traffic classification using semi-supervised learning. Perform Eval 64(9-12):1194–1213 Erman J, Mahanti A, Arlitt M, Cohen I, Williamson C (2007) Offline/realtime traffic classification using semi-supervised learning. Perform Eval 64(9-12):1194–1213
228.
Zurück zum Zitat Gao J, Liang F, Fan W, Sun Y, Han J (2011) A graph-based consensus maximization approach for combining multiple supervised and unsupervised models. IEEE Trans Knowl Data Eng 25(1):15–28 Gao J, Liang F, Fan W, Sun Y, Han J (2011) A graph-based consensus maximization approach for combining multiple supervised and unsupervised models. IEEE Trans Knowl Data Eng 25(1):15–28
229.
Zurück zum Zitat Almalawi AM, Fahad A, Tari Z, Cheema MA, Khalil I (2015) k nnvwc: An efficient k-nearest neighbors approach based on various-widths clustering. IEEE Trans Knowl Data Eng 28(1):68–81 Almalawi AM, Fahad A, Tari Z, Cheema MA, Khalil I (2015) k nnvwc: An efficient k-nearest neighbors approach based on various-widths clustering. IEEE Trans Knowl Data Eng 28(1):68–81
230.
Zurück zum Zitat Vlăduţu A, Comăneci D, Dobre C (2017) Internet traffic classification based on flows’ statistical properties with machine learning. Int J Netw Manag 27(3):e1929 Vlăduţu A, Comăneci D, Dobre C (2017) Internet traffic classification based on flows’ statistical properties with machine learning. Int J Netw Manag 27(3):e1929
231.
Zurück zum Zitat Li X, Qi F, Xu D, Qiu K (2011) An internet traffic classification method based on semi-supervised support vector machine. In: 2011 IEEE International conference on communications (ICC), pp 1–5. IEEE Li X, Qi F, Xu D, Qiu K (2011) An internet traffic classification method based on semi-supervised support vector machine. In: 2011 IEEE International conference on communications (ICC), pp 1–5. IEEE
232.
Zurück zum Zitat Qian F, Hu G, Yao X (2008) Semi-supervised internet network traffic classification using a gaussian mixture model. AEU-Inter J Electr Commun 62(7):557–564 Qian F, Hu G, Yao X (2008) Semi-supervised internet network traffic classification using a gaussian mixture model. AEU-Inter J Electr Commun 62(7):557–564
233.
Zurück zum Zitat Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput Commun Rev 37(1):5–16 Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Comput Commun Rev 37(1):5–16
234.
Zurück zum Zitat Sun GL, Xue Y, Dong Y, Wang D, Chenglong Li (2010) An novel hybrid method for effectively classifying encrypted traffic. In: 2010 IEEE Global telecommunications conference GLOBECOM 2010, pp 1–5. IEEE Sun GL, Xue Y, Dong Y, Wang D, Chenglong Li (2010) An novel hybrid method for effectively classifying encrypted traffic. In: 2010 IEEE Global telecommunications conference GLOBECOM 2010, pp 1–5. IEEE
235.
Zurück zum Zitat Shi H, Li H, Zhang D, Cheng C, Wu W (2017) Efficient and robust feature extraction and selection for traffic classification. Comput Netw 119:1–16 Shi H, Li H, Zhang D, Cheng C, Wu W (2017) Efficient and robust feature extraction and selection for traffic classification. Comput Netw 119:1–16
236.
Zurück zum Zitat Lu CN, Huang CY, Lin YD, Lai YC (2016) High performance traffic classification based on message size sequence and distribution. J Netw Comput Appl 76:60–74 Lu CN, Huang CY, Lin YD, Lai YC (2016) High performance traffic classification based on message size sequence and distribution. J Netw Comput Appl 76:60–74
237.
Zurück zum Zitat Kim J, Hwang J, Kim K (2016) High-performance internet traffic classification using a markov model and kullback-leibler divergence. Mob Inf Syst, 2016 Kim J, Hwang J, Kim K (2016) High-performance internet traffic classification using a markov model and kullback-leibler divergence. Mob Inf Syst, 2016
238.
Zurück zum Zitat Wang Y, Nelson R (2009) Identifying network application layer protocol with machine learning. In: Proc passive and active network measurement (PAM 09), Seoul, Korea Wang Y, Nelson R (2009) Identifying network application layer protocol with machine learning. In: Proc passive and active network measurement (PAM 09), Seoul, Korea
239.
Zurück zum Zitat Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: International workshop on passive and active network measurement, pp 41–54. Springer, Berlin Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: International workshop on passive and active network measurement, pp 41–54. Springer, Berlin
240.
Zurück zum Zitat Wang P, Lin SC, Lou M (2016) A framework for qos-aware traffic classification using semi-supervised machine learning in sdns. In: 2016 IEEE International conference on services computing (SCC), pp 760–765. IEEE Wang P, Lin SC, Lou M (2016) A framework for qos-aware traffic classification using semi-supervised machine learning in sdns. In: 2016 IEEE International conference on services computing (SCC), pp 760–765. IEEE
241.
Zurück zum Zitat Jiang H, Moore AW, Ge Z, Jin S, Wang J (2007) Lightweight application classification for network management. In: 2007 Proceedings of the SIGCOMM workshop on internet network management, pp 299–304. ACM Jiang H, Moore AW, Ge Z, Jin S, Wang J (2007) Lightweight application classification for network management. In: 2007 Proceedings of the SIGCOMM workshop on internet network management, pp 299–304. ACM
242.
Zurück zum Zitat Chen T, Zeng Y (2009) Classification of traffic flows into qos classes by unsupervised learning and knn clustering. KSII Trans Internet Inform Syst 3(2):134–146 Chen T, Zeng Y (2009) Classification of traffic flows into qos classes by unsupervised learning and knn clustering. KSII Trans Internet Inform Syst 3(2):134–146
243.
Zurück zum Zitat Seddiki MS, Shahbaz M, Donovan S, Grover S, Park M, Feamster N, Song YQ (2015) Flowqos: per-flow quality of service for broadband access networks, Technical report, Georgia Institute of Technology Seddiki MS, Shahbaz M, Donovan S, Grover S, Park M, Feamster N, Song YQ (2015) Flowqos: per-flow quality of service for broadband access networks, Technical report, Georgia Institute of Technology
244.
Zurück zum Zitat Park J, Tyan HR, Kuo CCJ (2006) Internet traffic classification for scalable qos provision. In: 2006 IEEE International conference on multimedia and expo, pp 1221–1224. IEEE Park J, Tyan HR, Kuo CCJ (2006) Internet traffic classification for scalable qos provision. In: 2006 IEEE International conference on multimedia and expo, pp 1221–1224. IEEE
245.
Zurück zum Zitat Zai-jian W, Dong Y, Shi H, Lingyun Y, Tang P (2016) Internet video traffic classification using qos features. In: 2016 International conference on computing, networking and communications (ICNC), pp 1–5. IEEE Zai-jian W, Dong Y, Shi H, Lingyun Y, Tang P (2016) Internet video traffic classification using qos features. In: 2016 International conference on computing, networking and communications (ICNC), pp 1–5. IEEE
246.
Zurück zum Zitat Yang J, Zhang S, Zhang X, Liu J, Cheng G (2013) Characterizing smartphone traffic with mapreduce. In: 2013 16th International symposium on wireless personal multimedia communications (WPMC), pp 1–5. IEEE, Yang J, Zhang S, Zhang X, Liu J, Cheng G (2013) Characterizing smartphone traffic with mapreduce. In: 2013 16th International symposium on wireless personal multimedia communications (WPMC), pp 1–5. IEEE,
247.
Zurück zum Zitat Seufert M, Casas P, Wehner N, Gang L, Li K (2019) Stream-based machine learning for real-time qoe analysis of encrypted video streaming traffic. In: 2019 22nd Conference on innovation in clouds, internet and networks and workshops (ICIN), pp 76–81. IEEE Seufert M, Casas P, Wehner N, Gang L, Li K (2019) Stream-based machine learning for real-time qoe analysis of encrypted video streaming traffic. In: 2019 22nd Conference on innovation in clouds, internet and networks and workshops (ICIN), pp 76–81. IEEE
248.
Zurück zum Zitat Bujlow T, Riaz T, Pedersen JM (2012) A method for classification of network traffic based on c5. 0 machine learning algorithm. In: 2012 international conference on computing, networking and communications (ICNC), pp 237–241. IEEE Bujlow T, Riaz T, Pedersen JM (2012) A method for classification of network traffic based on c5. 0 machine learning algorithm. In: 2012 international conference on computing, networking and communications (ICNC), pp 237–241. IEEE
249.
Zurück zum Zitat Kortebi A, Aouini Z, Delahaye C, Javaudin JP, Ghamri-Doudane Y (2017) A platform for home network traffic monitoring. In: IFIP/IEEE Symposium on integrated network and service management (IM), pp 895–896. IEEE Kortebi A, Aouini Z, Delahaye C, Javaudin JP, Ghamri-Doudane Y (2017) A platform for home network traffic monitoring. In: IFIP/IEEE Symposium on integrated network and service management (IM), pp 895–896. IEEE
250.
Zurück zum Zitat Iwai T, Nakao A (2016) Adaptive mobile application identification through in-network machine learning. In: 2016 18th Asia-pacific network operations and management symposium (APNOMS), pp 1–6. IEEE Iwai T, Nakao A (2016) Adaptive mobile application identification through in-network machine learning. In: 2016 18th Asia-pacific network operations and management symposium (APNOMS), pp 1–6. IEEE
251.
Zurück zum Zitat Grajzer M, Koziuk M, Szczechowiak P, Pescapé A (2012) multi-classification approach for the detection and identification of ehealth applications. In: 2012 21st International conference on computer communications and networks (ICCCN), pp 1–6. IEEE Grajzer M, Koziuk M, Szczechowiak P, Pescapé A (2012) multi-classification approach for the detection and identification of ehealth applications. In: 2012 21st International conference on computer communications and networks (ICCCN), pp 1–6. IEEE
252.
Zurück zum Zitat Valenti S, Rossi D (2011) Identifying key features for p2p traffic classification. In: 2011 IEEE International conference on communications (ICC), pp 1–6. IEEE Valenti S, Rossi D (2011) Identifying key features for p2p traffic classification. In: 2011 IEEE International conference on communications (ICC), pp 1–6. IEEE
253.
Zurück zum Zitat Baghel SK, Keshav K, Manepalli VR (2012) An investigation into traffic analysis for diverse data applications on smartphones. In: 2012 National conference on communications (NCC), pp 1–5. IEEE Baghel SK, Keshav K, Manepalli VR (2012) An investigation into traffic analysis for diverse data applications on smartphones. In: 2012 National conference on communications (NCC), pp 1–5. IEEE
254.
Zurück zum Zitat Pektaş A (2018) Proposal of machine learning approach for identification of instant messaging applications in raw network traffic. Inter J Intell Syst Appl Eng 6(2):97–102 Pektaş A (2018) Proposal of machine learning approach for identification of instant messaging applications in raw network traffic. Inter J Intell Syst Appl Eng 6(2):97–102
255.
Zurück zum Zitat Choi Y, Chung JY, Park B, Hong JWK (2012) Automated classifier generation for application-level mobile traffic identification. In: 2012 IEEE Network operations and management symposium, pp 1075–1081. IEEE Choi Y, Chung JY, Park B, Hong JWK (2012) Automated classifier generation for application-level mobile traffic identification. In: 2012 IEEE Network operations and management symposium, pp 1075–1081. IEEE
256.
Zurück zum Zitat Bonfiglio D, Mellia M, Meo M, Ritacca N, Rossi D (2008) Tracking down skype traffic. In: IEEE INFOCOM 2008-The 27th Conference on computer communications, pp 261–265. IEEE Bonfiglio D, Mellia M, Meo M, Ritacca N, Rossi D (2008) Tracking down skype traffic. In: IEEE INFOCOM 2008-The 27th Conference on computer communications, pp 261–265. IEEE
257.
Zurück zum Zitat Kampeas J, Cohen A, Gurewitz O (2018) Traffic classification based on zero-length packets. IEEE Trans Netw Serv Manag 15(3):1049–1062 Kampeas J, Cohen A, Gurewitz O (2018) Traffic classification based on zero-length packets. IEEE Trans Netw Serv Manag 15(3):1049–1062
258.
Zurück zum Zitat Aceto G, Ciuonzo D, Montieri A, Pescapé A (2017) Traffic classification of mobile apps through multi-classification. In: GLOBECOM 2017-2017 IEEE Global communications conference, pp 1–6. IEEE Aceto G, Ciuonzo D, Montieri A, Pescapé A (2017) Traffic classification of mobile apps through multi-classification. In: GLOBECOM 2017-2017 IEEE Global communications conference, pp 1–6. IEEE
259.
Zurück zum Zitat Tsompanidis I, Zahran AH, Sreenan CJ (2014) Mobile network traffic: A user behaviour model. In: 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC), pp 1–8. IEEE Tsompanidis I, Zahran AH, Sreenan CJ (2014) Mobile network traffic: A user behaviour model. In: 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC), pp 1–8. IEEE
260.
Zurück zum Zitat Vassio L, Drago I, Mellia M (2016) Detecting user actions from http traces: Toward an automatic approach. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp 50–55. IEEE Vassio L, Drago I, Mellia M (2016) Detecting user actions from http traces: Toward an automatic approach. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp 50–55. IEEE
261.
Zurück zum Zitat Aiolli F, Conti M, Gangwal A, Polato M (2019) Mind your wallet’s privacy: identifying bitcoin wallet apps and user’s actions through network traffic analysis. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp 1484–1491 ACM Aiolli F, Conti M, Gangwal A, Polato M (2019) Mind your wallet’s privacy: identifying bitcoin wallet apps and user’s actions through network traffic analysis. In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp 1484–1491 ACM
262.
Zurück zum Zitat Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi AR, Tarkoma S (2017) Iot sentinel: Automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp 2177–2184. IEEE Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi AR, Tarkoma S (2017) Iot sentinel: Automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp 2177–2184. IEEE
263.
Zurück zum Zitat Salman O, Chaddad L, Elhajj IH, Chehab A, Kayssi A (2018) Pushing intelligence to the network edge. In: 2018 Fifth International Conference on Software Defined Systems (SDS), pp 87–92. IEEE Salman O, Chaddad L, Elhajj IH, Chehab A, Kayssi A (2018) Pushing intelligence to the network edge. In: 2018 Fifth International Conference on Software Defined Systems (SDS), pp 87–92. IEEE
264.
Zurück zum Zitat Sivanathan A, Gharakheili HH, Loi F, Radford A, Wijenayake C, Vishwanath A, Sivaraman V (2018) Classifying iot devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing Sivanathan A, Gharakheili HH, Loi F, Radford A, Wijenayake C, Vishwanath A, Sivaraman V (2018) Classifying iot devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing
265.
Zurück zum Zitat Copos B, Levitt K, Bishop M, Rowe J (2016) Is anybody home? inferring activity from smart home network traffic. In: 2016 IEEE Security and Privacy Workshops (SPW), pp 245–251. IEEE Copos B, Levitt K, Bishop M, Rowe J (2016) Is anybody home? inferring activity from smart home network traffic. In: 2016 IEEE Security and Privacy Workshops (SPW), pp 245–251. IEEE
266.
Zurück zum Zitat Bezawada B, Bachani M, Peterson J, Shirazi H, Ray I, Ray I (2018) Iotsense:, Behavioral fingerprinting of iot devices. arXiv:1804.03852 Bezawada B, Bachani M, Peterson J, Shirazi H, Ray I, Ray I (2018) Iotsense:, Behavioral fingerprinting of iot devices. arXiv:1804.​03852
267.
Zurück zum Zitat Sciancalepore S, Ibrahim OA, Oligeri G, Di Pietro R (2019) Picking a needle in a haystack:, Detecting drones via network traffic analysis. arXiv:1901.03535 Sciancalepore S, Ibrahim OA, Oligeri G, Di Pietro R (2019) Picking a needle in a haystack:, Detecting drones via network traffic analysis. arXiv:1901.​03535
268.
Zurück zum Zitat Ortiz J, Crawford C, Le F (2019) Devicemien: network device behavior modeling for identifying unknown iot devices. In: Proceedings of the International Conference on Internet of Things Design and Implementation, pp 106–117 ACM Ortiz J, Crawford C, Le F (2019) Devicemien: network device behavior modeling for identifying unknown iot devices. In: Proceedings of the International Conference on Internet of Things Design and Implementation, pp 106–117 ACM
269.
Zurück zum Zitat Yang K, Li Q, Sun L (2019) Towards automatic fingerprinting of iot devices in the cyberspace. Comput Netw 148:318–327 Yang K, Li Q, Sun L (2019) Towards automatic fingerprinting of iot devices in the cyberspace. Comput Netw 148:318–327
270.
Zurück zum Zitat Dabbagh YS, Saad W (2019) Authentication of wireless devices in the internet of things: Learning and environmental effects IEEE Internet of Things Journal Dabbagh YS, Saad W (2019) Authentication of wireless devices in the internet of things: Learning and environmental effects IEEE Internet of Things Journal
271.
Zurück zum Zitat Noguchi H, Kataoka M, Yamato Y (2019) Device identification based on communication analysis for the internet of things. IEEE Access 7:52903–52912 Noguchi H, Kataoka M, Yamato Y (2019) Device identification based on communication analysis for the internet of things. IEEE Access 7:52903–52912
272.
Zurück zum Zitat Salman O, Elhajj IH, Chehab A, Kayssi A A machine learning based framework for iot device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies, 0(0):e3743. e3743 ETT-19-0273.R1. Salman O, Elhajj IH, Chehab A, Kayssi A A machine learning based framework for iot device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies, 0(0):e3743. e3743 ETT-19-0273.R1.
273.
Zurück zum Zitat Alipour-Fanid A, Dabaghchian M, Wang N, Wang P, Zhao L, Zeng K (2019) Machine learning-based delay-aware uav detection over encrypted wi-fi traffic. IEEE CNS Alipour-Fanid A, Dabaghchian M, Wang N, Wang P, Zhao L, Zeng K (2019) Machine learning-based delay-aware uav detection over encrypted wi-fi traffic. IEEE CNS
274.
Zurück zum Zitat Le F, Ortiz J, Verma D, Kandlur D (2019) Policy-based identification of iot devices’ vendor and type by dns traffic analysis. In: Policy-Based Autonomic Data Governance, pp 180–201. Springer, Berlin Le F, Ortiz J, Verma D, Kandlur D (2019) Policy-based identification of iot devices’ vendor and type by dns traffic analysis. In: Policy-Based Autonomic Data Governance, pp 180–201. Springer, Berlin
275.
Zurück zum Zitat Gopalratnam K, Basu S, Dunagan J, Wang HJ (2006) Automatically extracting fields from unknown network protocols. In: First Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML06) Gopalratnam K, Basu S, Dunagan J, Wang HJ (2006) Automatically extracting fields from unknown network protocols. In: First Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML06)
276.
Zurück zum Zitat Zhao S, Chen S, Sun Y, Cai Z, Su J (2019) Identifying known and unknown mobile application traffic using a multilevel classifier, Secur Commun Netw pp 2019 Zhao S, Chen S, Sun Y, Cai Z, Su J (2019) Identifying known and unknown mobile application traffic using a multilevel classifier, Secur Commun Netw pp 2019
277.
Zurück zum Zitat Kalmanek CR, Misra S, Yang YR (2010) Guide to reliable internet services and applications. Springer Science & Business Media Kalmanek CR, Misra S, Yang YR (2010) Guide to reliable internet services and applications. Springer Science & Business Media
278.
Zurück zum Zitat Xie Y, Deng H, Peng L, Chen Z (2018) Accurate identification of internet video traffic using byte code distribution features. In: International Conference on Algorithms and Architectures for Parallel Processing, pages 46–58. Springer, Berlin Xie Y, Deng H, Peng L, Chen Z (2018) Accurate identification of internet video traffic using byte code distribution features. In: International Conference on Algorithms and Architectures for Parallel Processing, pages 46–58. Springer, Berlin
279.
Zurück zum Zitat Canovas A, Jimenez JM, Romero O, Lloret J (2018) Multimedia data flow traffic classification using intelligent models based on traffic patterns. IEEE Netw 32(6):100–107 Canovas A, Jimenez JM, Romero O, Lloret J (2018) Multimedia data flow traffic classification using intelligent models based on traffic patterns. IEEE Netw 32(6):100–107
280.
Zurück zum Zitat Nguyen TD, Marchal S, Miettinen M, Asokan N, Sadeghi AR (2018) Dïot: a self-learning system for detecting compromised iot devices, CoRR, vol. abs/1804.07474 Nguyen TD, Marchal S, Miettinen M, Asokan N, Sadeghi AR (2018) Dïot: a self-learning system for detecting compromised iot devices, CoRR, vol. abs/1804.07474
281.
Zurück zum Zitat Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, Guarnizo JD, Elovici Y (2017) Detection of unauthorized iot devices using machine learning techniques. arXiv:1709.04647 Meidan Y, Bohadana M, Shabtai A, Ochoa M, Tippenhauer NO, Guarnizo JD, Elovici Y (2017) Detection of unauthorized iot devices using machine learning techniques. arXiv:1709.​04647
282.
Zurück zum Zitat Siby S, Maiti RR, Tippenhauer N (2017) Iotscanner:, Detecting and classifying privacy threats in iot neighborhoods. arXiv:1701.05007 Siby S, Maiti RR, Tippenhauer N (2017) Iotscanner:, Detecting and classifying privacy threats in iot neighborhoods. arXiv:1701.​05007
283.
Zurück zum Zitat Kawai H, Ata S, Nakamura N, Oka I (2017) Identification of communication devices from analysis of traffic patterns. In: 2017 13th International Conference on Network and Service Management (CNSM), pp 1–5. IEEE Kawai H, Ata S, Nakamura N, Oka I (2017) Identification of communication devices from analysis of traffic patterns. In: 2017 13th International Conference on Network and Service Management (CNSM), pp 1–5. IEEE
284.
Zurück zum Zitat Bai L, Yao L, Kanhere SS, Wang X, Yang Z (2018) Automatic device classification from network traffic streams of internet of things. In: 2018 IEEE 43rd Conference on Local Computer Networks (LCN), pp 1–9. IEEE Bai L, Yao L, Kanhere SS, Wang X, Yang Z (2018) Automatic device classification from network traffic streams of internet of things. In: 2018 IEEE 43rd Conference on Local Computer Networks (LCN), pp 1–9. IEEE
285.
Zurück zum Zitat Robyns P, Marin E, Lamotte W, Quax P, Singelée D, Preneel B (2017) Physical-layer fingerprinting of lora devices using supervised and zero-shot learning. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp 58–63 ACM Robyns P, Marin E, Lamotte W, Quax P, Singelée D, Preneel B (2017) Physical-layer fingerprinting of lora devices using supervised and zero-shot learning. In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp 58–63 ACM
286.
Zurück zum Zitat Das R, Gadre A, Zhang S, Kumar S, Moura JMF (2018) A deep learning approach to iot authentication. In: 2018 IEEE International Conference On Communications (ICC), pp 1–6. IEEE Das R, Gadre A, Zhang S, Kumar S, Moura JMF (2018) A deep learning approach to iot authentication. In: 2018 IEEE International Conference On Communications (ICC), pp 1–6. IEEE
287.
Zurück zum Zitat Feamster N, Balazinska M, Harfst G, Balakrishnan H, Karger DR (2002) Infranet: Circumventing web censorship and surveillance. In: In USENIX Security Symposium, pp 247–262 Feamster N, Balazinska M, Harfst G, Balakrishnan H, Karger DR (2002) Infranet: Circumventing web censorship and surveillance. In: In USENIX Security Symposium, pp 247–262
289.
Zurück zum Zitat Wiley B (2011) Dust: A blocking-resistant internet transport protocol. Technical rep ort. http://blanu. net/Dust. pdf Wiley B (2011) Dust: A blocking-resistant internet transport protocol. Technical rep ort. http://​blanu.​ net/Dust. pdf
290.
Zurück zum Zitat Wang Q, Gong X, Nguyen GTK, Houmansadr A, Borisov N (2012) Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 121–132 ACM Wang Q, Gong X, Nguyen GTK, Houmansadr A, Borisov N (2012) Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 121–132 ACM
291.
Zurück zum Zitat Weinberg Z, Wang J, Yegneswaran V, Briesemeister L, Cheung S, Wang F, Boneh D (2012) Stegotorus: a camouflage proxy for the tor anonymity system. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 109–120 ACM Weinberg Z, Wang J, Yegneswaran V, Briesemeister L, Cheung S, Wang F, Boneh D (2012) Stegotorus: a camouflage proxy for the tor anonymity system. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 109–120 ACM
292.
Zurück zum Zitat Moghaddam HM, Li B, Derakhshani M, Goldberg I (2012) Skypemorph: Protocol obfuscation for tor bridges. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 97–108 ACM Moghaddam HM, Li B, Derakhshani M, Goldberg I (2012) Skypemorph: Protocol obfuscation for tor bridges. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp 97–108 ACM
293.
Zurück zum Zitat Dyer KP , Coull SE , Ristenpart T, Shrimpton T (2012) Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: 2012 IEEE symposium on security and privacy, pp 332–346. IEEE Dyer KP , Coull SE , Ristenpart T, Shrimpton T (2012) Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: 2012 IEEE symposium on security and privacy, pp 332–346. IEEE
296.
Zurück zum Zitat Winter P, Pulls T, Fuss J (2013) Scramblesuit:, A polymorph network protocol to circumvent censorship. arXiv:1305.3199 Winter P, Pulls T, Fuss J (2013) Scramblesuit:, A polymorph network protocol to circumvent censorship. arXiv:1305.​3199
297.
Zurück zum Zitat Houmansadr A, Riedl TJ, Borisov N, Singer AC (2013) I want my voice to be heard: Ip over voice-over-ip for unobservable censorship circumvention. In NDSS Houmansadr A, Riedl TJ, Borisov N, Singer AC (2013) I want my voice to be heard: Ip over voice-over-ip for unobservable censorship circumvention. In NDSS
299.
Zurück zum Zitat Dyer KP, Coull SE, Ristenpart T, Shrimpton T (2013) Protocol misidentification made easy with format-transforming encryption. In: Proceedings of the ACM SIGSAC conference on Computer & communications security, pp 61–72. ACM Dyer KP, Coull SE, Ristenpart T, Shrimpton T (2013) Protocol misidentification made easy with format-transforming encryption. In: Proceedings of the ACM SIGSAC conference on Computer & communications security, pp 61–72. ACM
301.
Zurück zum Zitat Gardiner J, Nagaraja S (2014) Blindspot:, Indistinguishable anonymous communications. arXiv:1408.0784 Gardiner J, Nagaraja S (2014) Blindspot:, Indistinguishable anonymous communications. arXiv:1408.​0784
302.
Zurück zum Zitat Lv J, Zhu C, Tang S, Yang C (2014) Deepflow: Hiding anonymous communication traffic in p2p streaming networks. Wuhan Univ J Nat Sci 19(5):417–425 Lv J, Zhu C, Tang S, Yang C (2014) Deepflow: Hiding anonymous communication traffic in p2p streaming networks. Wuhan Univ J Nat Sci 19(5):417–425
303.
Zurück zum Zitat Li S, Schliep M, Hopper N (2014) Facet: Streaming over videoconferencing for censorship circumvention. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp 163–172 ACM Li S, Schliep M, Hopper N (2014) Facet: Streaming over videoconferencing for censorship circumvention. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp 163–172 ACM
305.
Zurück zum Zitat Tang Y, Lin P, Luo Z (2015) psobj: Defending against traffic analysis with pseudo-objects. In: International Conference on Network and System Security, pp 96–109. Springer, Berlin Tang Y, Lin P, Luo Z (2015) psobj: Defending against traffic analysis with pseudo-objects. In: International Conference on Network and System Security, pp 96–109. Springer, Berlin
306.
Zurück zum Zitat Tang Y, Lin P, Luo Z (2014) Obfuscating encrypted web traffic with combined objects. In: International Conference on Information Security Practice and Experience, pp 90–104. Springer, Berlin Tang Y, Lin P, Luo Z (2014) Obfuscating encrypted web traffic with combined objects. In: International Conference on Information Security Practice and Experience, pp 90–104. Springer, Berlin
307.
Zurück zum Zitat Li Y, Dai R, Zhang J (2014) Morphing communications of cyber-physical systems towards moving-target defense. In: 2014 IEEE International Conference on Communications (ICC), pp 592–598. IEEE Li Y, Dai R, Zhang J (2014) Morphing communications of cyber-physical systems towards moving-target defense. In: 2014 IEEE International Conference on Communications (ICC), pp 592–598. IEEE
308.
Zurück zum Zitat Moore WB, Tan H, Sherr M, Maloof MA (2015) Multi-class traffic morphing for encrypted voip communication. In: International Conference on Financial Cryptography and Data Security, pp 65–85. Springer, Berlin Moore WB, Tan H, Sherr M, Maloof MA (2015) Multi-class traffic morphing for encrypted voip communication. In: International Conference on Financial Cryptography and Data Security, pp 65–85. Springer, Berlin
309.
Zurück zum Zitat Kohls K, Holz T, Kolossa D, Pöpper C (2016) Skypeline: Robust hidden data transmission for voip. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp 877–888 ACM Kohls K, Holz T, Kolossa D, Pöpper C (2016) Skypeline: Robust hidden data transmission for voip. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp 877–888 ACM
310.
Zurück zum Zitat McPherson R, Houmansadr A, Shmatikov V (2016) Covertcast: Using live streaming to evade internet censorship. Proceedings on Privacy Enhancing Technologies 2016(3):212–225 McPherson R, Houmansadr A, Shmatikov V (2016) Covertcast: Using live streaming to evade internet censorship. Proceedings on Privacy Enhancing Technologies 2016(3):212–225
311.
Zurück zum Zitat Barradas D, Santos N, Rodrigues L (2017) deltashaper: Enabling unobservable censorship-resistant tcp tunneling over videoconferencing streams. Proceedings on Privacy Enhancing Technologies 2017(4):5–22 Barradas D, Santos N, Rodrigues L (2017) deltashaper: Enabling unobservable censorship-resistant tcp tunneling over videoconferencing streams. Proceedings on Privacy Enhancing Technologies 2017(4):5–22
312.
Zurück zum Zitat Li F, Razaghpanah A, Kakhki AM, Niaki AA, Choffnes D, Gill P, Mislove A (2017) lib∙ erate,(n): A library for exposing (traffic-classification) rules and avoiding them efficiently. In: Proceedings of the 2017 Internet Measurement Conference, pp 128–141 ACM Li F, Razaghpanah A, Kakhki AM, Niaki AA, Choffnes D, Gill P, Mislove A (2017) lib∙ erate,(n): A library for exposing (traffic-classification) rules and avoiding them efficiently. In: Proceedings of the 2017 Internet Measurement Conference, pp 128–141 ACM
313.
Zurück zum Zitat Cai X, Nithyanand R, Wang T, Johnson R, Goldberg I (2014) A systematic approach to developing Evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp 227–238. ACM Cai X, Nithyanand R, Wang T, Johnson R, Goldberg I (2014) A systematic approach to developing Evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp 227–238. ACM
314.
Zurück zum Zitat Iacovazzi A, Elovici Y (2016) Network flow watermarking: a survey. IEEE Commun Surv & Tut 19(1):512–530 Iacovazzi A, Elovici Y (2016) Network flow watermarking: a survey. IEEE Commun Surv & Tut 19(1):512–530
315.
Zurück zum Zitat Dixon L, Ristenpart T, Shrimpton T (2016) Network traffic obfuscation and automated internet censorship. IEEE Secur & Privacy 14(6):43–53 Dixon L, Ristenpart T, Shrimpton T (2016) Network traffic obfuscation and automated internet censorship. IEEE Secur & Privacy 14(6):43–53
316.
Zurück zum Zitat Ghaleb TA (2016) Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. Clust Comput 19(1):427–438 Ghaleb TA (2016) Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. Clust Comput 19(1):427–438
317.
Zurück zum Zitat Wright CV, Coull SE, Monrose F (2009) Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS, volume 9. Citeseer Wright CV, Coull SE, Monrose F (2009) Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS, volume 9. Citeseer
318.
Zurück zum Zitat Rowland CH (1997) Covert channels in the tcp/ip protocol suite. First Monday 2(5) Rowland CH (1997) Covert channels in the tcp/ip protocol suite. First Monday 2(5)
319.
Zurück zum Zitat Ahsan K, Kundur D (2002) Practical data hiding in tcp/ip. In: Proc. Workshop on Multimedia Security at ACM Multimedia, volume 2 Ahsan K, Kundur D (2002) Practical data hiding in tcp/ip. In: Proc. Workshop on Multimedia Security at ACM Multimedia, volume 2
320.
Zurück zum Zitat Huang Y, Xiao B, Xiao H (2008) Implementation of covert communication based on steganography. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 1512–1515. IEEE Huang Y, Xiao B, Xiao H (2008) Implementation of covert communication based on steganography. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 1512–1515. IEEE
321.
Zurück zum Zitat Burnett S, Feamster N, Vempala S (2010) Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium, pp 463–468. Washington, DC Burnett S, Feamster N, Vempala S (2010) Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium, pp 463–468. Washington, DC
322.
Zurück zum Zitat Invernizzi L, Kruegel C, Vigna G (2013) Message in a bottle: Sailing past censorship. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp 39–48 ACM Invernizzi L, Kruegel C, Vigna G (2013) Message in a bottle: Sailing past censorship. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp 39–48 ACM
323.
Zurück zum Zitat Barradas D, Santos N, Rodrigues L (2018) Effective detection of multimedia protocol tunneling using machine learning. In: 27th {USENIX}, Security Symposium ({USENIX} Security, vol 18, pp 169–185 Barradas D, Santos N, Rodrigues L (2018) Effective detection of multimedia protocol tunneling using machine learning. In: 27th {USENIX}, Security Symposium ({USENIX} Security, vol 18, pp 169–185
324.
Zurück zum Zitat Parchekani A, Naghadeh SN, Shah-Mansouri V (2020) Classification of traffic using neural networks by rejecting:, a novel approach in classifying vpn traffic. arXiv:2001.03665 Parchekani A, Naghadeh SN, Shah-Mansouri V (2020) Classification of traffic using neural networks by rejecting:, a novel approach in classifying vpn traffic. arXiv:2001.​03665
325.
Zurück zum Zitat Liu H, Wang Z, Miao F (2014) Concurrent multipath traffic impersonating for enhancing communication privacy. Int J Commun Syst 27(11):2985–2996 Liu H, Wang Z, Miao F (2014) Concurrent multipath traffic impersonating for enhancing communication privacy. Int J Commun Syst 27(11):2985–2996
326.
Zurück zum Zitat Hu Y, Li X, Liu J, Ding H, Gong Y, Fang Y (2018) Mitigating traffic analysis attack in smartphones with edge network assistance. In: 2018 IEEE International Conference on Communications (ICC), pp 1–6. IEEE Hu Y, Li X, Liu J, Ding H, Gong Y, Fang Y (2018) Mitigating traffic analysis attack in smartphones with edge network assistance. In: 2018 IEEE International Conference on Communications (ICC), pp 1–6. IEEE
327.
Zurück zum Zitat Gokcen Y, Foroushani VA, Zincir Heywood AN (2014) Can we identify nat behavior by analyzing traffic flows?. In: 2014 IEEE Security and Privacy Workshops, pp 132–139. IEEE Gokcen Y, Foroushani VA, Zincir Heywood AN (2014) Can we identify nat behavior by analyzing traffic flows?. In: 2014 IEEE Security and Privacy Workshops, pp 132–139. IEEE
328.
Zurück zum Zitat Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Technical report, Naval Research Lab Washington DC Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Technical report, Naval Research Lab Washington DC
329.
Zurück zum Zitat Saleh S, Qadir J, Ilyas MU (2018) Shedding light on the dark corners of the internet: a survey of tor research. J Netw Comput Appl 114:1–28 Saleh S, Qadir J, Ilyas MU (2018) Shedding light on the dark corners of the internet: a survey of tor research. J Netw Comput Appl 114:1–28
330.
Zurück zum Zitat He G, Yang M, Luo J, Gu X (2015) A novel application classification attack against tor. Concurrency and Computation: Practice and Experience 27(18):5640–5661 He G, Yang M, Luo J, Gu X (2015) A novel application classification attack against tor. Concurrency and Computation: Practice and Experience 27(18):5640–5661
331.
Zurück zum Zitat Hodo E, Bellekens X, Iorkyase E, Hamilton A, Tachtatzis C, Atkinson R (2017) Machine learning approach for detection of nontor traffic. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp 85 ACM Hodo E, Bellekens X, Iorkyase E, Hamilton A, Tachtatzis C, Atkinson R (2017) Machine learning approach for detection of nontor traffic. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp 85 ACM
332.
Zurück zum Zitat AlSabah M, Bauer K, Goldberg I (2012) Enhancing tor’s performance using real-time traffic classification. In: Proceedings of the 2012 ACM conference on computer and communications security, pp 73–84. ACM AlSabah M, Bauer K, Goldberg I (2012) Enhancing tor’s performance using real-time traffic classification. In: Proceedings of the 2012 ACM conference on computer and communications security, pp 73–84. ACM
333.
Zurück zum Zitat Shahbar K, Zincir-Heywood AN (2014) Benchmarking two techniques for tor classification: Flow level and circuit level classification. In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp 1–8. IEEE Shahbar K, Zincir-Heywood AN (2014) Benchmarking two techniques for tor classification: Flow level and circuit level classification. In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp 1–8. IEEE
334.
Zurück zum Zitat Shahbar S, Zincir-Heywood AN (2015) Traffic flow analysis of tor pluggable transports. In: 2015 11th International Conference on Network and Service Management (CNSM), pp 178–181. IEEE Shahbar S, Zincir-Heywood AN (2015) Traffic flow analysis of tor pluggable transports. In: 2015 11th International Conference on Network and Service Management (CNSM), pp 178–181. IEEE
335.
Zurück zum Zitat Shahbar K, Zincir-Heywood AN (2017) An analysis of tor pluggable transports under adversarial conditions. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp 1–7. IEEE Shahbar K, Zincir-Heywood AN (2017) An analysis of tor pluggable transports under adversarial conditions. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp 1–7. IEEE
336.
Zurück zum Zitat Pescape A, Montieri A, Aceto G, Ciuonzo D (2018) Anonymity services tor, i2p, jondonym: Classifying in the dark (web), IEEE Transactions on Dependable and Secure Computing Pescape A, Montieri A, Aceto G, Ciuonzo D (2018) Anonymity services tor, i2p, jondonym: Classifying in the dark (web), IEEE Transactions on Dependable and Secure Computing
337.
Zurück zum Zitat Montieri A, Ciuonzo D, Bovenzi G, Persico V, Pescapé A (2019) A dive into the dark web: Hierarchical traffic classification of anonymity tools. IEEE Transactions on Network Science and Engineering Montieri A, Ciuonzo D, Bovenzi G, Persico V, Pescapé A (2019) A dive into the dark web: Hierarchical traffic classification of anonymity tools. IEEE Transactions on Network Science and Engineering
338.
Zurück zum Zitat He G, Yang M, Luo J, Gu X (2014) Inferring application type information from tor encrypted traffic. In: 2014 Second International Conference on Advanced Cloud and Big Data, pp 220–227. IEEE He G, Yang M, Luo J, Gu X (2014) Inferring application type information from tor encrypted traffic. In: 2014 Second International Conference on Advanced Cloud and Big Data, pp 220–227. IEEE
339.
Zurück zum Zitat AlSabah M, Goldberg I (2016) Performance and security improvements for tor: a survey. ACM Computing Surveys (CSUR) 49(2):32 AlSabah M, Goldberg I (2016) Performance and security improvements for tor: a survey. ACM Computing Surveys (CSUR) 49(2):32
340.
Zurück zum Zitat Matic S, Troncoso C, Caballero J (2017) Dissecting tor bridges: a security evaluation of their private and public infrastructures. In: Network and Distributed Systems Security Symposium, pp 1–15. The Internet Society Matic S, Troncoso C, Caballero J (2017) Dissecting tor bridges: a security evaluation of their private and public infrastructures. In: Network and Distributed Systems Security Symposium, pp 1–15. The Internet Society
341.
Zurück zum Zitat Qu B, Zhang Z, Guo L, Zhu X, Guo L, Meng D (2012) An empirical study of morphing on network traffic classification. In: 7th International Conference on Communications and Networking in China, pp 227–232. IEEE Qu B, Zhang Z, Guo L, Zhu X, Guo L, Meng D (2012) An empirical study of morphing on network traffic classification. In: 7th International Conference on Communications and Networking in China, pp 227–232. IEEE
342.
Zurück zum Zitat Qu B, Zhang Z, Zhu X, Meng D (2015) An empirical study of morphing on behavior-based network traffic classification. Secur Commun Netw 8(1):68–79 Qu B, Zhang Z, Zhu X, Meng D (2015) An empirical study of morphing on behavior-based network traffic classification. Secur Commun Netw 8(1):68–79
343.
Zurück zum Zitat Fu X, Graham B, Bettati R, Zhao W (2003) On effectiveness of link padding for statistical traffic analysis attacks. In: 23rd International Conference on Distributed Computing Systems 2003 Proceedings, pp 340–347. IEEE Fu X, Graham B, Bettati R, Zhao W (2003) On effectiveness of link padding for statistical traffic analysis attacks. In: 23rd International Conference on Distributed Computing Systems 2003 Proceedings, pp 340–347. IEEE
344.
Zurück zum Zitat Iacovazzi A, Baiocchi A (2015) Protecting traffic privacy for massive aggregated traffic. Comput Netw 77:1–17 Iacovazzi A, Baiocchi A (2015) Protecting traffic privacy for massive aggregated traffic. Comput Netw 77:1–17
345.
Zurück zum Zitat Iacovazzi A, Baiocchi A (2012) Padding and fragmentation for masking packet length statistics. In: International Workshop on Traffic Monitoring and Analysis, pp 85–88. Springer, Berlin Iacovazzi A, Baiocchi A (2012) Padding and fragmentation for masking packet length statistics. In: International Workshop on Traffic Monitoring and Analysis, pp 85–88. Springer, Berlin
346.
Zurück zum Zitat Iacovazzi A, Baiocchi A (2013) Investigating the trade-off between overhead and delay for full packet traffic privacy. In: IEEE International Conference on Communications Workshops (ICC), pp 1345–1350. IEEE Iacovazzi A, Baiocchi A (2013) Investigating the trade-off between overhead and delay for full packet traffic privacy. In: IEEE International Conference on Communications Workshops (ICC), pp 1345–1350. IEEE
347.
Zurück zum Zitat Iacovazzi A, Baiocchi A (2010) Optimum packet length masking. In: 2010 22nd International Teletraffic Congress (lTC 22), pp 1–8. IEEE Iacovazzi A, Baiocchi A (2010) Optimum packet length masking. In: 2010 22nd International Teletraffic Congress (lTC 22), pp 1–8. IEEE
348.
Zurück zum Zitat Iacovazzi A, Baiocchi A (2013) Internet traffic privacy enhancement with masking: Optimization and tradeoffs. IEEE Trans Parall Distrib Syst 25(2):353–362 Iacovazzi A, Baiocchi A (2013) Internet traffic privacy enhancement with masking: Optimization and tradeoffs. IEEE Trans Parall Distrib Syst 25(2):353–362
349.
Zurück zum Zitat Wang L, Dyer KP, Akella A, Ristenpart T, Shrimpton T (2015) Seeing through network-protocol obfuscation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp 57–69 ACM Wang L, Dyer KP, Akella A, Ristenpart T, Shrimpton T (2015) Seeing through network-protocol obfuscation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp 57–69 ACM
350.
Zurück zum Zitat Houmansadr A, Brubaker C, Shmatikov V (2013) The parrot is dead: Observing unobservable network communications. In: 2013 IEEE Symposium on Security and Privacy, pp 65–79. IEEE Houmansadr A, Brubaker C, Shmatikov V (2013) The parrot is dead: Observing unobservable network communications. In: 2013 IEEE Symposium on Security and Privacy, pp 65–79. IEEE
351.
Zurück zum Zitat Yang M, Luo J, Ling Z, Fu X, Yu W (2015) De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun Mag 53(4):60–66 Yang M, Luo J, Ling Z, Fu X, Yu W (2015) De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun Mag 53(4):60–66
352.
Zurück zum Zitat Rigaki M, Garcia S (2018) Bringing a gan to a knife-fight: Adapting malware communication to avoid detection. In: 2018 IEEE Security and Privacy Workshops (SPW), pp 70–75. IEEE Rigaki M, Garcia S (2018) Bringing a gan to a knife-fight: Adapting malware communication to avoid detection. In: 2018 IEEE Security and Privacy Workshops (SPW), pp 70–75. IEEE
353.
Zurück zum Zitat Ring M, Schlör D, Landes D, Hotho A (2019) Flow-based network traffic generation using generative adversarial networks. Computers & Security 82:156–172 Ring M, Schlör D, Landes D, Hotho A (2019) Flow-based network traffic generation using generative adversarial networks. Computers & Security 82:156–172
354.
Zurück zum Zitat Bai Q, Xiong G, Zhao Y (2014) Find behaviors of network evasion and protocol obfuscation using traffic measurement. In: International Conference on Trustworthy Computing and Services, pp 342–349. Springer, Berlin Bai Q, Xiong G, Zhao Y (2014) Find behaviors of network evasion and protocol obfuscation using traffic measurement. In: International Conference on Trustworthy Computing and Services, pp 342–349. Springer, Berlin
355.
Zurück zum Zitat Cao Z, Xiong G, Guo L (2015) Mimichunter: A general passive network protocol mimicry detection framework. In: 2015 IEEE Trustcom/BigDataSE/ISPA, IEEE, vol 1, pp 271–278 Cao Z, Xiong G, Guo L (2015) Mimichunter: A general passive network protocol mimicry detection framework. In: 2015 IEEE Trustcom/BigDataSE/ISPA, IEEE, vol 1, pp 271–278
356.
Zurück zum Zitat Dusi M, Crotti M, Gringoli F, Salgarelli L (2009) Tunnel hunter: Detecting application-layer tunnels with statistical fingerprinting. Comput Netw 53(1):81–97 Dusi M, Crotti M, Gringoli F, Salgarelli L (2009) Tunnel hunter: Detecting application-layer tunnels with statistical fingerprinting. Comput Netw 53(1):81–97
357.
Zurück zum Zitat Shirey RW (2007) Internet security glossary version 2 Shirey RW (2007) Internet security glossary version 2
358.
Zurück zum Zitat Stallings W (2006) Cryptography and network security, 4/E pearson education india Stallings W (2006) Cryptography and network security, 4/E pearson education india
359.
Zurück zum Zitat Sun Q, Simon DR, Wang YM, Russell W, Padmanabhan VN, Qiu L (2002) Statistical identification of encrypted web browsing traffic. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp 19–30. IEEE Sun Q, Simon DR, Wang YM, Russell W, Padmanabhan VN, Qiu L (2002) Statistical identification of encrypted web browsing traffic. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp 19–30. IEEE
360.
Zurück zum Zitat Chen S, Wang R, Wang XF, Zhang K (2010) Side-channel leaks in web applications: A reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy, pp 191–206. IEEE Chen S, Wang R, Wang XF, Zhang K (2010) Side-channel leaks in web applications: A reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy, pp 191–206. IEEE
361.
Zurück zum Zitat Gruteser M, Grunwald D (2005) Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. Mobile Netw Appl 10(3):315–325 Gruteser M, Grunwald D (2005) Enhancing location privacy in wireless lan through disposable interface identifiers: a quantitative analysis. Mobile Netw Appl 10(3):315–325
362.
Zurück zum Zitat Jiang T, Wang HJ, Hu YC (2007) Preserving location privacy in wireless lans. In: Proceedings of the 5th international conference on Mobile systems, applications and services, pp 246–257 ACM Jiang T, Wang HJ, Hu YC (2007) Preserving location privacy in wireless lans. In: Proceedings of the 5th international conference on Mobile systems, applications and services, pp 246–257 ACM
363.
Zurück zum Zitat Fan Y, Lin B, Jiang Y, Shen X (2008) An efficient privacy-preserving scheme for wireless link layer security. In: IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, pp 1–5. IEEE Fan Y, Lin B, Jiang Y, Shen X (2008) An efficient privacy-preserving scheme for wireless link layer security. In: IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, pp 1–5. IEEE
364.
Zurück zum Zitat Greenstein B, McCoy D, Pang J, Kohno T, Seshan S, Wetherall D (2008) Improving wireless privacy with an identifier-free link layer protocol. In: Proceedings of the 6th international conference on Mobile systems, applications, and services, pp 40–53 ACM Greenstein B, McCoy D, Pang J, Kohno T, Seshan S, Wetherall D (2008) Improving wireless privacy with an identifier-free link layer protocol. In: Proceedings of the 6th international conference on Mobile systems, applications, and services, pp 40–53 ACM
365.
Zurück zum Zitat Bauer K, McCoy D, Greenstein B, Grunwald D, Sicker D (2009) Physical layer attacks on unlinkability in wireless lans. In: International Symposium on Privacy Enhancing Technologies Symposium, pp 108–127. Springer, Berlin Bauer K, McCoy D, Greenstein B, Grunwald D, Sicker D (2009) Physical layer attacks on unlinkability in wireless lans. In: International Symposium on Privacy Enhancing Technologies Symposium, pp 108–127. Springer, Berlin
366.
Zurück zum Zitat Hu W, Willkomm D, Abusubaih M, Gross J, Vlantis G, Gerla M, Wolisz A (2007) Dynamic frequency hopping communities for efficient ieee 802.22 operation. IEEE Commun Mag 45(5):80–87 Hu W, Willkomm D, Abusubaih M, Gross J, Vlantis G, Gerla M, Wolisz A (2007) Dynamic frequency hopping communities for efficient ieee 802.22 operation. IEEE Commun Mag 45(5):80–87
367.
Zurück zum Zitat Sheth A, Seshan S, Wetherall D (2009) Geo-fencing: Confining wi-fi coverage to physical boundaries. In: International Conference on Pervasive Computing, pp 274–290. Springer, Berlin Sheth A, Seshan S, Wetherall D (2009) Geo-fencing: Confining wi-fi coverage to physical boundaries. In: International Conference on Pervasive Computing, pp 274–290. Springer, Berlin
368.
Zurück zum Zitat Martinovic I, Pichota P, Schmitt JB (2009) Jamming for good: a fresh approach to authentic communication in wsns. In: Proceedings of the second ACM conference on Wireless network security, pp 161–168 ACM Martinovic I, Pichota P, Schmitt JB (2009) Jamming for good: a fresh approach to authentic communication in wsns. In: Proceedings of the second ACM conference on Wireless network security, pp 161–168 ACM
369.
Zurück zum Zitat Lakshmanan S, Tsao CL, Sivakumar R, Sundaresan K (2008) Securing wireless data networks against eavesdropping using smart antennas. In: 2008 The 28th International Conference on Distributed Computing Systems, pp 19–27. IEEE Lakshmanan S, Tsao CL, Sivakumar R, Sundaresan K (2008) Securing wireless data networks against eavesdropping using smart antennas. In: 2008 The 28th International Conference on Distributed Computing Systems, pp 19–27. IEEE
370.
Zurück zum Zitat Zhang F, He W, Liu X (2011) Defending against traffic analysis in wireless networks through traffic reshaping. In: 2011 31st International Conference on Distributed Computing Systems, pp 593–602. IEEE Zhang F, He W, Liu X (2011) Defending against traffic analysis in wireless networks through traffic reshaping. In: 2011 31st International Conference on Distributed Computing Systems, pp 593–602. IEEE
371.
Zurück zum Zitat Dainotti A, Pescape A, Claffy KC (2012) Issues and future directions in traffic classification. IEEE network 26(1):35–40 Dainotti A, Pescape A, Claffy KC (2012) Issues and future directions in traffic classification. IEEE network 26(1):35–40
372.
Zurück zum Zitat Al Khater N, Overill RE (2015) Network traffic classification techniques and challenges. In: 2015 Tenth International Conference on Digital Information Management (ICDIM), pp 43–48. IEEE Al Khater N, Overill RE (2015) Network traffic classification techniques and challenges. In: 2015 Tenth International Conference on Digital Information Management (ICDIM), pp 43–48. IEEE
373.
Zurück zum Zitat Fernández-Delgado M, Cernadas E, Barro S, Amorim D (2014) Do we need hundreds of classifiers to solve real world classification problems? J Machine Learn Res 15(1):3133–3181MathSciNetMATH Fernández-Delgado M, Cernadas E, Barro S, Amorim D (2014) Do we need hundreds of classifiers to solve real world classification problems? J Machine Learn Res 15(1):3133–3181MathSciNetMATH
374.
Zurück zum Zitat Crotti M, Gringoli F, Salgarelli L (2009) Impact of asymmetric routing on statistical traffic classification. In: GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, pp 1–8. IEEE Crotti M, Gringoli F, Salgarelli L (2009) Impact of asymmetric routing on statistical traffic classification. In: GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, pp 1–8. IEEE
375.
Zurück zum Zitat Grzenda M (2012) Towards the reduction of data used for the classification of network flows. In: International Conference on Hybrid Artificial Intelligence Systems, pp 68–77. Springer, Berlin Grzenda M (2012) Towards the reduction of data used for the classification of network flows. In: International Conference on Hybrid Artificial Intelligence Systems, pp 68–77. Springer, Berlin
376.
Zurück zum Zitat De Donato W, Pescapé A, Dainotti A (2014) Traffic identification engine: an open platform for traffic classification. IEEE Netw 28(2):56–64 De Donato W, Pescapé A, Dainotti A (2014) Traffic identification engine: an open platform for traffic classification. IEEE Netw 28(2):56–64
381.
Zurück zum Zitat Meo AFMM, Munafo MM, Rossi D (2020) 10-year experience of internet traffic monitoring with tstat Meo AFMM, Munafo MM, Rossi D (2020) 10-year experience of internet traffic monitoring with tstat
382.
Zurück zum Zitat Salman O, Elhajj IH, Kayssi A, Chehab A (2020) Denoising adversarial autoencoder for obfuscated traffic detection and recovery. In: Boumerdassi S, Renault É, Mühlethaler P (eds) Machine Learning for Networking. Springer International Publishing, Cham, pp 99–116 Salman O, Elhajj IH, Kayssi A, Chehab A (2020) Denoising adversarial autoencoder for obfuscated traffic detection and recovery. In: Boumerdassi S, Renault É, Mühlethaler P (eds) Machine Learning for Networking. Springer International Publishing, Cham, pp 99–116
383.
Zurück zum Zitat Grimaudo L, Mellia M, Baralis E (2012) Hierarchical learning for fine grained internet traffic classification. In: 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp 463–468. IEEE Grimaudo L, Mellia M, Baralis E (2012) Hierarchical learning for fine grained internet traffic classification. In: 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp 463–468. IEEE
384.
Zurück zum Zitat Callado AC, Kamienski CA, Szabó G, Gero BP, Kelner J, Fernandes SFL, Sadok DFH (2009) A survey on internet traffic identification. IEEE Commun Surv & Tut 11(3):37–52 Callado AC, Kamienski CA, Szabó G, Gero BP, Kelner J, Fernandes SFL, Sadok DFH (2009) A survey on internet traffic identification. IEEE Commun Surv & Tut 11(3):37–52
385.
Zurück zum Zitat Nguyen TTT, Armitage G (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv & Tut 10(4):56–76 Nguyen TTT, Armitage G (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv & Tut 10(4):56–76
386.
Zurück zum Zitat Finsterbusch M, Richter C, Rocha E, Muller JA, Hanssgen K (2013) A survey of payload-based traffic classification approaches. IEEE Commun Surv & Tut 16(2):1135–1156 Finsterbusch M, Richter C, Rocha E, Muller JA, Hanssgen K (2013) A survey of payload-based traffic classification approaches. IEEE Commun Surv & Tut 16(2):1135–1156
387.
Zurück zum Zitat Pacheco F, Exposito E, Gineste M, Baudoin C, Aguilar J (2018) Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun Surv & Tut 21(2):1988–2014 Pacheco F, Exposito E, Gineste M, Baudoin C, Aguilar J (2018) Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun Surv & Tut 21(2):1988–2014
388.
Zurück zum Zitat Wang P, Chen X, Ye F, Sun Z (2019) A survey of techniques for mobile service encrypted traffic classification using deep learning. IEEE Access 7:54024–54033 Wang P, Chen X, Ye F, Sun Z (2019) A survey of techniques for mobile service encrypted traffic classification using deep learning. IEEE Access 7:54024–54033
389.
Zurück zum Zitat Tahaei H, Afifi F, Asemi A, Zaki F, Anuar NB (2020) The rise of traffic classification in iot networks: A survey. J Netw Computer Appl, pp 102538 Tahaei H, Afifi F, Asemi A, Zaki F, Anuar NB (2020) The rise of traffic classification in iot networks: A survey. J Netw Computer Appl, pp 102538
Metadaten
Titel
A review on machine learning–based approaches for Internet traffic classification
verfasst von
Ola Salman
Imad H. Elhajj
Ayman Kayssi
Ali Chehab
Publikationsdatum
22.06.2020
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 11-12/2020
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-020-00770-7

Weitere Artikel der Ausgabe 11-12/2020

Annals of Telecommunications 11-12/2020 Zur Ausgabe

Neuer Inhalt