參考文獻 |
[1] Mohammad Lotfollahi, Mahdi Jafari Siavoshani, Ramin Shirali Hossein Zade, and Mohammdsadegh Saberian. Deep packet: A novel approach for encrypted traffic classification using deep learning. Soft Computing, 24(3):1999–2012, 2020.
[2] Tal Shapira and Yuval Shavitt. Flowpic: Encrypted internet traffic classification is as easy as image recognition. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 680–687. IEEE, 2019.
[3] Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao, and Yanqi Song. Network traffic classification model based on attention mechanism and spatiotemporal features. EURASIP Journal on Information Security, 2023(1):6, 2023.
[4] EDGE Technologies. Global internet traffic growth forecast: Looking forward from 2024. https://edgeoptic.com/global-internet-traffic-growth-forecast-looking-forward-from-2024/. Accessed: 2024-06-19.
[5] Cisco, Inc. Cisco annual internet report. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html. Accessed: 2024-06-19.
[6] Luca Schumann, Trinh Viet Doan, Tanya Shreedhar, Ricky Mok, and Vaibhav Bajpai. Impact of evolving protocols and covid-19 on internet traffic shares. arXiv preprint arXiv:2201.00142, 2022.
[7] Canadian Centre for Cyber Security. Cyber threat bulletin: Impact of covid-19 on cyber threat activity. https://www.cyber.gc.ca/en/guidance/ cyber-threat-bulletin-impact-covid-19-cyber-threat-activity.
[8] Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, and Ali A Ghorbani. Characterization of encrypted and vpn traffic using time-related. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pages 407–414, 2016.
[9] Michelle Cotton, Lars Eggert, Joe Touch, Magnus Westerlund, and Stuart Cheshire. Internet assigned numbers authority (iana) procedures for the management of the service name and transport protocol port number registry. Technical report, 2011.
[10] William Stallings. Data and computer communications. Pearson Education India, 2007.
[11] Thomas Karagiannis, Andre Broido, Michalis Faloutsos, and KC Claffy. Transport layer identification of p2p traffic. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 121–134, 2004.
[12] Grenville J Armitage. Inferring the extent of network address port translation at public/private internet boundaries. Centre for Advanced Internet Architectures, Swinburne University of Technology, Melbourne, Australia, Tech. Rep. A, 20712:12, 2002.
[13] Thomas Karagiannis, Andre Broido, Nevil Brownlee, Kimberly C Claffy, and Michalis Faloutsos. Is p2p dying or just hiding?[p2p traffic measurement]. In IEEE Global Telecommunications Conference, 2004. GLOBECOM’04., volume 3, pages 1532–1538. IEEE, 2004.
[14] Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, and Nick Duffield. Class-ofservice mapping for qos: a statistical signature-based approach to ip traffic classification. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 135–148, 2004.
[15] HaiTao He, XiaoNan Luo, FeiTeng Ma, ChunHui Che, and JianMin Wang. Network traffic classification based on ensemble learning and co-training. Science in China Series F: Information Sciences, 52(2):338–346, 2009.
[16] Huawei Huang, Peng Li, and Song Guo. Traffic scheduling for deep packet inspection in software-defined networks. Concurrency and computation: practice and experience, 29(16):e3967, 2017.
[17] Young-Hoon Goo, Kyu-Seok Shim, Su-Kang Lee, and Myung-Sup Kim. Payload signature structure for accurate application traffic classification. In 2016 18th AsiaPacific Network Operations and Management Symposium (APNOMS), pages 1–4, 2016.
[18] Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, and Randy H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In 2006 Symposium on Architecture For Networking And Communications Systems, pages 93–102, 2006.
[19] Christopher L Hayes and Yan Luo. Dpico: a high speed deep packet inspection engine using compact finite automata. In Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems, pages 195–203, 2007.
[20] Yibo Xue, Dawei Wang, and Luoshi Zhang. Traffic classification: Issues and challenges. In 2013 International Conference on Computing, Networking and Communications (ICNC), pages 545–549. IEEE, 2013.
[21] Andrew W Moore and Denis Zuev. Internet traffic classification using bayesian analysis techniques. In Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 50–60, 2005.
[22] Ruchika Aggarwal and Nanhay Singh. A new hybrid approach for network traffic classification using svm and na‥?ve bayes algorithm. Int. J. Comput. Sci. Mobile Comput, 6:168–174, 2017.
[23] Juliana Vergara-Reyes, Maria Camila Martinez-Ordonez, Armando Ordonez, and Oscar Mauricio Caicedo Rendon. Ip traffic classification in nfv: A benchmarking of supervised machine learning algorithms. In 2017 IEEE Colombian Conference on Communications and Computing (COLCOM), pages 1–6, 2017.
[24] Ahmed Abdelmoamen Ahmed and Gbenga Agunsoye. A real-time network traffic classifier for online applications using machine learning. Algorithms, 14(8):250, 2021.
[25] Ali Ahlashkari. CICFlowMeter. https://github.com/ahlashkari/CICFlowMeter, 2023.
[26] J Ross Quinlan. C4. 5: programs for machine learning. Elsevier, 2014.
[27] Baris Yamansavascilar, M Amac Guvensan, A Gokhan Yavuz, and M Elif Karsligil. Application identification via network traffic classification. In 2017 International Conference on Computing, Networking and Communications (ICNC), pages 843–848. IEEE, 2017.
[28] Leif E Peterson. K-nearest neighbor. Scholarpedia, 4(2):1883, 2009.
[29] Andrew Moore, Denis Zuev, and Michael Crogan. Discriminators for use in flowbased classification. Technical report, 2013.
[30] Jeffrey Erman, Martin Arlitt, and Anirban Mahanti. Traffic classification using clustering algorithms. In Proceedings of the 2006 SIGCOMM workshop on Mining network data, pages 281–286, 2006.
[31] John A Hartigan and Manchek A Wong. Algorithm as 136: A k-means clustering algorithm. Journal of the royal statistical society. series c (applied statistics), 28(1):100–108, 1979.
[32] Xiaowei Xu, M. Ester, H.-P. Kriegel, and J. Sander. A distribution-based clustering algorithm for mining in large spatial databases. In Proceedings 14th International Conference on Data Engineering, pages 324–331, 1998.
[33] Peter Cheeseman, James Kelly, Matthew Self, John Stutz, Will Taylor, and Don Freeman. Autoclass: A bayesian classification system. In Machine learning proceedings 1988, pages 54–64. Elsevier, 1988.
[34] Peng Xiao, Na Liu, Yuanyuan Li, Ying Lu, Xiao-jun Tang, Hai-wen Wang, and Mingxia Li. A traffic classification method with spectral clustering in sdn. In 2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pages 391–394. IEEE, 2016.
[35] Jinghua Yan and Jing Yuan. A survey of traffic classification in software defined networks. In 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), pages 200–206. IEEE, 2018.
[36] Adrian Lara, Anisha Kolasani, and Byrav Ramamurthy. Network innovation using openflow: A survey. IEEE communications surveys & tutorials, 16(1):493–512, 2013.
[37] Wei Wang, Ming Zhu, Jinlin Wang, Xuewen Zeng, and Zhongzhen Yang. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE international conference on intelligence and security informatics (ISI), pages 43–48. IEEE, 2017.
[38] R Rohith, Minal Moharir, G Shobha, et al. Packet generation. In 2018 international conference on networking, embedded and wireless systems (ICNEWS), pages 1–5. IEEE, 2018.
[39] R Rohith, Minal Moharir, G Shobha, et al. Packet sniffing. In 2018 international conference on networking, embedded and wireless systems (ICNEWS), pages 1–5. IEEE, 2018.
[40] R Rohith, Minal Moharir, G Shobha, et al. Packet dissection. In 2018 international conference on networking, embedded and wireless systems (ICNEWS), pages 1–5. IEEE, 2018.
[41] Saad Albawi, Tareq Abed Mohammed, and Saad Al-Zawi. Understanding of a convolutional neural network. In 2017 international conference on engineering and technology (ICET), pages 1–6. Ieee, 2017.
[42] Weili Fang, Peter ED Love, Hanbin Luo, and Lieyun Ding. Computer vision for behaviour-based safety in construction: A review and future directions. Advanced Engineering Informatics, 43:100980, 2020.
[43] Spyros G Tzafestas. Introduction to mobile robot control. Elsevier, 2013.
[44] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. Advances in neural information processing systems, 30, 2017.
[45] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pretraining of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018.
[46] Alec Radford. Improving language understanding by generative pre-training. 2018.
[47] Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, et al. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929, 2020.
[48] Stefan Elfwing, Eiji Uchibe, and Kenji Doya. Sigmoid-weighted linear units for neural network function approximation in reinforcement learning. Neural networks, 107:3–11, 2018.
[49] Prajit Ramachandran, Barret Zoph, and Quoc V. Le. Searching for activation functions. CoRR, abs/1710.05941, 2017.
[50] TechNews Taiwan Inc. AMD company data has been hacked, 2024. Accessed: 2024-06-20.
[51] Central News Agency. JAXA has been hacked, 2024. Accessed: 2024-06-21.
[52] Wireshark Foundation. Wireshark: The world’s most popular network protocol analyzer. Accessed: 2023-03-23.
[53] The Tcpdump Team. Packet capture (pcap). Accessed: 2023-12-24.
[54] IEEE. Maximum transmission unit (mtu). Defined in IEEE 802.3 Standard. Accessed: 2024-08-26.
[55] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770–778, 2016.
[56] Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15(1):1929–1958, 2014.
[57] John G Proakis. Digital signal processing: principles, algorithms, and applications, 4/E. Pearson Education India, 2007.
[58] Jimmy Lei Ba, Jamie Ryan Kiros, and Geoffrey E Hinton. Layer normalization. arXiv preprint arXiv:1607.06450, 2016.
[59] Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning, pages 448–456. pmlr, 2015.
[60] Shibani Santurkar, Dimitris Tsipras, Andrew Ilyas, and Aleksander Madry. How does batch normalization help optimization? Advances in neural information processing systems, 31, 2018.
[61] Wikipedia contributors. Interpolation — Wikipedia, the free encyclopedia, 2024. [Online; accessed 13-May-2024].
[62] Bolin Gao and Lacra Pavel. On the properties of the softmax function with application in game theory and reinforcement learning. arXiv preprint arXiv:1704.00805, 2017.
[63] OpenVPN Technologies, Inc. Openvpn, 2016. Accessed: 2024-08-26.
[64] DP Kingma. Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
[65] Dan Hendrycks and Kevin Gimpel. Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415, 2016. |