Author:
Cherukuri Aswani Kumar,Ikram Sumaiya Thaseen,Li Gang,Liu Xiao
Publisher
Springer International Publishing
Reference52 articles.
1. Wright, C. V., Monrose, F., & Masson, G. M. (2006). On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research, 7(12).
2. Bernaille, L., & Teixeira, R. (2007). Early recognition of encrypted applications. In International conference on passive and active network measurement (pp. 165–175). Springer.
3. Dusi, M., Crotti, M., Gringoli, F., & Salgarelli, L. (2009). Tunnel hunter: Detecting application-layer tunnels with statistical fingerprinting. Computer Networks, 53(1), 81–97.
4. Crotti, M., Dusi, M., Gringoli, F., & Salgarelli, L. (2007). Detecting HTTP tunnels with statistical mechanisms. In IEEE international conference on communications ICC ‘07 (pp. 6162–6168).
5. Karagiannis, T., Papagiannaki, K., & Faloutsos, M. (2005). BLINC: Multilevel traffic classification in the dark. In Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 229–240).