A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

A survey on internet traffic identification

A Callado, C Kamienski, G Szabó… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
The area of Internet traffic measurement has advanced enormously over the last couple of
years. This was mostly due to the increase in network access speeds, due to the …

[PDF][PDF] Characterization of encrypted and vpn traffic using time-related

G Draper-Gil, AH Lashkari, MSI Mamun… - Proceedings of the …, 2016 - scitepress.org
Traffic characterization is one of the major challenges in today's security industry. The
continuous evolution and generation of new applications and services, together with the …

VAE-Stega: linguistic steganography based on variational auto-encoder

ZL Yang, SY Zhang, YT Hu, ZW Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, linguistic steganography based on text auto-generation technology has
been greatly developed, which is considered to be a very promising but also a very …

RNN-stega: Linguistic steganography based on recurrent neural networks

ZL Yang, XQ Guo, ZM Chen, YF Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Linguistic steganography based on text carrier auto-generation technology is a current topic
with great promise and challenges. Limited by the text automatic generation technology or …

A survey of methods for encrypted traffic classification and analysis

P Velan, M Čermák, P Čeleda… - International Journal of …, 2015 - Wiley Online Library
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …

Robust network traffic classification

J Zhang, X Chen, Y Xiang, W Zhou… - IEEE/ACM transactions …, 2014 - ieeexplore.ieee.org
As a fundamental tool for network management and security, traffic classification has
attracted increasing attention in recent years. A significant challenge to the robustness of …

Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning

A Habibi Lashkari, G Kaur, A Rahali - Proceedings of the 2020 10th …, 2020 - dl.acm.org
Darknet traffic classification is significantly important to categorize real-time applications.
Although there are notable efforts to classify darknet traffic which rely heavily on existing …

Network traffic classification using correlation information

J Zhang, Y Xiang, Y Wang, W Zhou… - … on Parallel and …, 2012 - ieeexplore.ieee.org
Traffic classification has wide applications in network management, from security monitoring
to quality of service measurements. Recent research tends to apply machine learning …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …