Author:
Steffi P. L.,Sam Emmanuel W. R.,Rani P. Arockia Jansi
Publisher
Springer Nature Switzerland
Reference24 articles.
1. Draper-gil, G., Lashkari, A.H., Saiful, M., Mamun, I., Ghorbani, A.A.: Characterization of encrypted and VPN Traffic using time-related features, pp. 407–414 (2016). https://doi.org/10.5220/0005740704070414
2. Elmaghraby, R.T., Abdel, N.M., Sobh, M.A., Bahaa-eldin, A.M.: Encrypted network traffic classification based on machine learning. Ain Shams Eng. J. 15, 102361 (2024). https://doi.org/10.1016/j.asej.2023.102361
3. Pfaff, B., et al.: The design and implementation of open vSwitch. In: 12th USENIX Symposium on Network Systems Design and Implementation (NSDI 2015), pp. 116–130 (2015)
4. Lin, Y., Lu, C., Lai, Y., Peng, W., Lin, P.: Application classification using packet size distribution and port association. J. Netw. Comput. Appl. 32, 1023–1030 (2009). https://doi.org/10.1016/j.jnca.2009.03.001
5. Alshammari, R., Zincir-heywood, A.N.: Machine learning based encrypted traffic classification: identifying SSH and skype. In: CISDA 2009: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defence, pp. 289–296 (2009)