期刊文献+

网络加密流量识别研究综述及展望 被引量:63

Review and perspective on encrypted traffic identification research
下载PDF
导出
摘要 鉴于加密流量识别技术的重要性和已有相关研究工作,首先根据流量分析需求的层次介绍了加密流量识别的类型,如协议、应用和服务。其次,概述已有加密流量识别技术,并从多个角度进行分析对比。最后,归纳现有加密流量识别研究存在的不足及影响当前加密流量识别的因素,如隧道技术、流量伪装技术、新型协议HTTP/2.0和QUIC等,并对加密流量识别趋势及未来研究方向进行展望。 Considering the importance of encrypted traffic identification technology and existing research work, first, the type of encrypted traffic identification according to the demand of traffic analysis were introduced, such as protocols, applications and services. Second, the encrypted traffic identification technology was summarized, and identification technology was compared from multiple views. Third, the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced, such as tunneling, traffic camouflage technology, new protocols of HTTP/2.0 and QUIC. Finally, prospect trends and directions of future research on encrypted traffic identification were discussed.
出处 《通信学报》 EI CSCD 北大核心 2016年第9期154-167,共14页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(No.2015AA015603) 江苏省未来网络创新研究院未来网络前瞻性研究基金资助项目(No.BY2013095-5-03) 江苏省"六大人才高峰"高层次人才基金资助项目(No.2011-DZ024) 中央高校基本科研业务费专项资金 江苏省普通高校研究生科研创新计划基金资助项目(No.KYLX15_0118)~~
关键词 加密流量识别 网络管理 流量工程 流量伪装 HTTP/2.0 encrypted traffic identification network management traffic engineering traffic camouflaging HTTP/2.0
  • 相关文献

参考文献79

  • 1ROUGHAN M, SEN S, SPATSCHECK O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification[C]//The 4th ACM SIGCOMM Conference on Interact measurement. ACM, 2004: 135-148.
  • 2DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the sec- ond-generation onion router[R]. Naval Research Lab Washington DC, 2004.
  • 3GOMES J V, INACIO P R M, PEREIRA M, et al. Detection and clas- sification of peer-to-peer traffic: a survey[J]. ACM Computing Sur-veys (CSUR), 2013, 45(3): 30.
  • 4GILL P, ARLITT M, LI Z, et al. Youtube traffic characterization: a view from the edge[C]/fFhe 7th ACM SIGCOMM Conference on Internet Measurement. ACM, 2007:15-28.
  • 5ZHANG X B, LAM S S, LEE D Y, et al. Protocol design for scalable and reliable group rekeying[J]. IEEE/ACM Transactions on Network- ing, 2003, 11(6): 908-922.
  • 6BARRY S. Google starts giving a ranking boost to secure HTTPS/SSL sites [EB/OL]. http://searchengineland.com/google-starts-giving- ranking- boost-secure-httpsssl-sites- 199446, 2015.
  • 7NGUYEN T T T, ARMITAGE G, A survey of techniques for intemet traffic classification using machine learning[J]. Communications Sur- veys & Tutorials, IEEE, 2008, 10(4): 56-76.
  • 8NAMDEV N, AGRAWAL S, SILKARI S. Recent advancement in machine learning based internet traffic classification[J]. Procedia Computer Science, 2015, 60: 784-791.
  • 9DAINOTTI A, PESCAPE A, CLAFFY K C. Issues and future direc- tions in traffic classification[J]. Network, IEEE, 2012, 26(1): 35-40.
  • 10BUJLOW T, CARELA-ESPA/qOL V, BARLET-ROS P. Independent comparison of popular DPI tools for traffic classification[J]. Computer Networks, 2015, 76: 75-89.

二级参考文献40

  • 1谢宏,程浩忠,牛东晓.基于信息熵的粗糙集连续属性离散化算法[J].计算机学报,2005,28(9):1570-1574. 被引量:134
  • 2Alshammari R, Zincir-Heywood AN. A flow based approach for SSH traffic detection. In: Proc. of the IEEE Int'l Conf. on Systems, Man and Cybernetics (ISIC). 2007. 296-301. [doi: 10.1109/ICSMC.2007.4414006].
  • 3Yu Q, Huo HW. Algorithms improving the storage efficiency of deep packet inspection. Ruan Jian Xue Bao/Journal of Software, 2011,22(1):149-163 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3724.htm [doi: 10.3724/SPJ.1001.2011. 03724].
  • 4Xu P, Lin S. Internet traffic classification using C4.5 decision tree. Ruan Jian Xue Bao/Journal of Software, 2009,20(10): 2692-2704 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3444.htm [doi: 10.3724/SP.J.1001.2009.03444].
  • 5Alshammari R, Zincir-Heywood AN. Generalization of signatures for SSH encrypted traffic identification. In: Proc. of the Computational Intelligence in Cyber Security. 2009. 167-174. [doi: 10.1109/CICYBS.2009.4925105].
  • 6Bernaille L, Teixeira R, Akodkenou I, Soule A, Salamation K. Traffic classification on the fly. SIGCOMM Computer Communication Review, 2006,36(2):23-26. [doi: 10.1145/1129582.1129589].
  • 7Bernaille L, Teixeira R. Early recognition of encrypted applications. In: Proc. of the 8th Int'l Conf. on Passive and Active Network Measurement (PAM 2007). Louvain-Ia-Neuve, 2007. 165-175. [doi: 10.1007/978-3-540-71617-4_17].
  • 8Alshammari R, Zincir-Heywood AN. Investigating two different approaches for encrypted traffic classification. In: Proc. of the 2008 Sixth Annual Conf. on Privacy, Security and Trust. 2008. 156-166. [doi: 10.1109/PST.2008.15].
  • 9Haffner P, Sen S, Spats check 0, Wang DM. ACAS: Automated construction of application signatures. In: Proc. of the ACM SIGCOMM Workshop on Mining Network Data. 2005.197-202. [doi: 10.1145/1080173.1080183].
  • 10Baset SA, Schulzrinne HN. An analysis of the skype peer-to-peer Internet telephony protocol. In: Proc. of the IEEE Infocom 2006. 2006.1-11. [doi: 10.1109/INFOCOM.2006.312].

共引文献74

同被引文献303

引证文献63

二级引证文献210

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部