2017
DOI: 10.1109/tifs.2017.2692682
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 148 publications
(45 citation statements)
references
References 25 publications
0
45
0
Order By: Relevance
“…Since the arrival time of the traffic packets in each flow is different and the values of the fields such as TTL are also different. Different from the methods of dealing with temporal feature like Feghhi and Leith [30] and Shen et al [31], this paper uses the LSTM network to perform automatic temporal feature extraction on the original flow data. In this paper, the LSTM network uses two layers of cells for temporal feature extraction.…”
Section: Lstm Modelmentioning
confidence: 99%
“…Since the arrival time of the traffic packets in each flow is different and the values of the fields such as TTL are also different. Different from the methods of dealing with temporal feature like Feghhi and Leith [30] and Shen et al [31], this paper uses the LSTM network to perform automatic temporal feature extraction on the original flow data. In this paper, the LSTM network uses two layers of cells for temporal feature extraction.…”
Section: Lstm Modelmentioning
confidence: 99%
“…Compared to the traditional machine learning research [17], current researches on encrypted traffic classification using machine learning approach produced various type of output that could be further analysed and refined. Study by [39], [40], [42], [43] managed to perform encrypted traffic classification that identify traffic with fine granularity output of information.…”
Section: Discussion and Comparisonmentioning
confidence: 99%
“…Another supervised research for encrypted traffic from [40] has proposed an attribute-aware classification that utilized second-order Markov Chain algorithm. Second-order Markov Chains is required in order to determine state transition probabilities.…”
Section: B Traffic Classification On Non-tor Networkmentioning
confidence: 99%
“…Terminals, such as Raspberry Pi, mobile phones, and Google Glass, are small end devices that have limited computation, storage, and energy resources . Recently, applications running on terminals, such as object detection, indoor localization, and encrypting, are increasingly data‐intensive and latency‐critical. For example, Google Glass needs to classify the objects in pictures it takes, and augmented reality games need indoor localization information to render real‐life environments on mobile phones.…”
Section: Introductionmentioning
confidence: 99%