On inferring application protocol behaviors in encrypted network traffic
From MaRDI portal
Publication:3174064
zbMATH Open1222.68038MaRDI QIDQ3174064FDOQ3174064
Authors: Charles V. Wright, Fabian Monrose, Gerald M. Masson
Publication date: 12 October 2011
Full work available at URL: http://www.jmlr.org/papers/v7/wright06a.html
Recommendations
- An Entropy Based Encrypted Traffic Classifier
- A nonlinear, recurrence-based approach to traffic classification
- Towards the detection of encrypted bittorrent traffic through deep packet inspection
- An investigation of multi-objective genetic algorithms for encrypted traffic identification
- Profiling and identification of P2P traffic
Learning and adaptive systems in artificial intelligence (68T05) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cited In (8)
- An investigation of multi-objective genetic algorithms for encrypted traffic identification
- Statistical learning methods for information security: fundamentals and case studies
- Towards the detection of encrypted bittorrent traffic through deep packet inspection
- An Entropy Based Encrypted Traffic Classifier
- Joint detection of malicious domains and infected clients
- A nonlinear, recurrence-based approach to traffic classification
- Efficient application identification and the temporal and spatial stability of classification schema
- Sequence alignment for masquerade detection
This page was built for publication: On inferring application protocol behaviors in encrypted network traffic
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3174064)