共 54 条
[1]
SOYSAL M, SCHMIDT E G., Machine learning algorithms for accurate flow-based network traffic classification: evaluation and comparison, Performance Evaluation, 67, 6, pp. 451-467, (2010)
[2]
DUSI M, GRINGOLI F, SALGARELLI L., Quantifying the accuracy of the ground truth associated with Internet traffic traces, Computer Networks, 55, 5, pp. 1158-1167, (2011)
[3]
CHEN M H, ZHU Y F, LU B, Et al., Classification of application type of encrypted traffic based on attention-CNN, Computer Science, 48, 4, pp. 325-332, (2021)
[4]
CAMPFIELD M., The practical difference between known and unknown threats, Computer Fraud & Security, 5, pp. 6-9, (2021)
[5]
FRANK J., Artificial intelligence and intrusion detection: current and future directions, Computers & Security, 14, 1, (1995)
[6]
TING C, FIELD R, FISHER A, Et al., Compression analytics for classification and anomaly detection within network communication, IEEE Transactions on Information Forensics and Security, 14, 5, pp. 1366-1376, (2019)
[7]
ZENG Y, WU Z Y, DONG L H, Et al., Research on malicious traffic identification technology in encrypted traffic, Journal of Xidian University, 48, 3, pp. 170-187, (2021)
[8]
YANG J, CHEN X, CHEN S W, Et al., Conditional variational auto-encoder and extreme value theory aided two-stage learning approach for intelligent fine-grained known/unknown intrusion detection, IEEE Transactions on Information Forensics and Security, 16, pp. 3538-3553, (2021)
[9]
AKHTAR N, MIAN A., Threat of adversarial attacks on deep learning in computer vision: a survey, IEEE Access, 6, pp. 14410-14430, (2018)
[10]
HAN Y, FANG B X, CUI X, Et al., StealthyFlow: a framework for malware dynamic traffic camouflaging in adversarial environment, Chinese Journal of Computers, 44, 5, pp. 948-962, (2021)