[1] |
人民网研究院. <中国移动互联网发展报告(2021)>正式发布(2021)[EB/OL].[2021-07-22]. http://finance.people.com.cn/n1/2021/0722/c1004-32166880.html.
|
[2] |
QuestMobile研究院. QuestMobile 中国移动互联网2021半年大报告[EB/OL].[2021-07-27]. https://www.questmobile.com.cn/research/report-new/164.
|
[3] |
运行监测协调局. 2021 年通信业统计公报(2022)[EB/OL].[2022-01-25]. https://www.miit.gov.cn/gxsj/tjfx/txy/art/2022/art_e8b64ba8f29d4ce18a1003c4f4d88234.html.
|
[4] |
LUO J, BAO L, NI L. AMethod of Shadowsocks(r) Traffic Identification Based on Protocol Analysis[C]// 2021 IEEE 21st International Conference on Communication Technology (ICCT).Piscataway:IEEE, 2021:6-10.
|
[5] |
JI Q, DENG X, NI L, et al. Research on Shadowsocks(R) Traffic Identification Based on Xgboost Algorithm[C]//International Conference on Intelligent and Interactive Systems and Applications. Heidelberg:Springer, 2020:53-61.
|
[6] |
JI Q, DENG X, NI L. Research on Shadowsocks(r) Traffic Identification Based on Dart Algorithm[C]// 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC).Heidelberg:Springer, 2021:666-672.
|
[7] |
TAYLOR V F, SPOLAOR R, CONTI M, et al. Appscanner:Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic[C]//2016 IEEE European Symposium on Security and Privacy(EuroS&P). Piscataway:IEEE, 2016:439-454.
|
[8] |
TAYLOR V F, SPOLAOR R, CONTI M, et al. Robust Smartphone App Identification via Encrypted Network Traffic Analysis[J]. IEEE Transactions on Information Forensics and Security, 2018, 13:63-78.
doi: 10.1109/TIFS.2017.2737970
|
[9] |
ADI E, BAIG Z A, HINGSTON P. Stealthy Denial of Service (DoS) Attack Modelling and Detection for HTTP/2 Services[J]. Journal of Network and Computer Applications, 2017, 91:1-13.
doi: 10.1016/j.jnca.2017.04.015
|
[10] |
DRAPER-GIL G, LASHKARI A H, MAMUN M S I, et al. Characterization of Encrypted and Vpn Traffic Using Time-Related[C]//Proceedings of the 2nd International Conference on Information Systems security and Privacy(ICISSP). Rome:ICISSP, 2016:407-414.
|
[11] |
ERTAM F, AVCI E. A New Approach for Internet Traffic Classification:GA-WK-ELM[J]. Measurement, 2017, 95:135-142.
doi: 10.1016/j.measurement.2016.10.001
|
[12] |
曾勇, 吴正远, 董丽华, 等. 加密流量中的恶意流量识别技术[J]. 西安电子科技大学学报, 2021, 48(3):170-187.
|
|
ZENG Yong, WU Zhengyuan, DONG Lihua, et al. Research on Malicious Traffic Identification Technology in Encrypted Traffic[J]. Journal of Xidian University, 2021, 48(3):170-187.
|
[13] |
FALAKI H, LYMBEROPOULOS D, MAHAJAN R, et al. A First Look at Traffic on Smartphones[C]// Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2010:281-287.
|
[14] |
MONGKOLLUKSAMEE S, VISOOTTIVISETH V, FUKUDA K. Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance[J]. Journal of Information Processing, 2016, 24:247-254.
doi: 10.2197/ipsjjip.24.247
|
[15] |
BOCCHI E, GRIMAUDO L, MELLIA M, et al. Magma Network Behavior Classifier for Malwaretraffic[J]. Computer Networks, 2016, 109:142-156.
doi: 10.1016/j.comnet.2016.03.021
|
[16] |
JAKALAN A, GONG J, SU Q, et al. Social Relationship Discovery of IP Addresses in the Managed IP Networks by Observing Traffic at Network Boundary[J]. Computer Networks, 2016, 100:12-27.
doi: 10.1016/j.comnet.2016.02.012
|
[17] |
AKKARIIIN, BREAKWA11. ShadowsocksR协议插件文档(2021)) [EB/OL].[2021-08-8]. https://github.com/shadowsocksrr/shadowsocks-rss/blob/master/ssr.md.
|
[18] |
王岁兴. shadowsocks 及其代理的 app 流量识别研究[D]. 西安: 西安电子科技大学, 2021.
|
[19] |
KARAGIANNIS T, PAPAGIANNAKI K, FALOUTSOS M. BLINC:Multilevel Traffic Classification in the Dark[C]// Proceedings of the 2005 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications. New York: ACM, 2005:229-240.
|
[20] |
KORCZYИSKI M, DUDA A. Markov Chain Fingerprinting to Classify Encrypted Traffic[C]// IEEEINFOCOM 2014 - IEEE Conference on Computer Communications.Piscataway:IEEE, 2014:781-789.
|
[21] |
XIANG C, CHEN Q, XUE M, et al. APPCLASSIFIER:Automated App Inference on Encrypted Traffic via Meta Data Analysis[C]//2018 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE, 2018:1-7.
|