2014 IEEE Symposium on Computers and Communications (ISCC) 2014
DOI: 10.1109/iscc.2014.6912553
|View full text |Cite
|
Sign up to set email alerts
|

On the performance of DPI signature matching with dynamic priority

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…The traditional traffic identification methods include the deep packet inspection [2][3][4][5] and the deep flow inspection. The traditional traffic identification methods include the deep packet inspection [2][3][4][5] and the deep flow inspection.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The traditional traffic identification methods include the deep packet inspection [2][3][4][5] and the deep flow inspection. The traditional traffic identification methods include the deep packet inspection [2][3][4][5] and the deep flow inspection.…”
Section: Introductionmentioning
confidence: 99%
“…At present, dynamic internet protocol, dynamic ports, and fake ports are often used in the process of network communication. The traditional traffic identification methods include the deep packet inspection [2][3][4][5] and the deep flow inspection. [6][7][8] For the encryption traffic identification, the traditional identification method was faced with a series of issues.…”
Section: Introductionmentioning
confidence: 99%