2013
DOI: 10.1007/978-3-642-35795-4_51
|View full text |Cite
|
Sign up to set email alerts
|

Classification Research on SSL Encrypted Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Then, to decide whether the flow is a YouTube stream we use either the Service Name Indication (SNI) field in the Client Hello message (e.g. googlevideos.com) or machine learning techniques [20], [21]. Then we can remove audio packets; i.e., bursts below 400kB, since video traffic bursts are much larger.…”
Section: Preprocessingmentioning
confidence: 99%
“…Then, to decide whether the flow is a YouTube stream we use either the Service Name Indication (SNI) field in the Client Hello message (e.g. googlevideos.com) or machine learning techniques [20], [21]. Then we can remove audio packets; i.e., bursts below 400kB, since video traffic bursts are much larger.…”
Section: Preprocessingmentioning
confidence: 99%
“…If the "googlevideos.com" string is found in the SNI, the flow is passed to the next module. Note that the YouTube flows identification can also be done using machine learning techniques [45,46].…”
Section: Preprocessingmentioning
confidence: 99%
“…In addition, Barati et al (2013) proposed a feature selection IDS in Encrypted Traffic Using Genetic Algorithm (GA). SSL traffic classification in Google traffic was proposed by Fu et al (2013) using C4.5 algorithm. Furthermore, considering harmonic mean as distance metric in clustering approach was implemented by Zhang et al (2013) to classify real-world encrypted traffic.…”
Section: Fig1 Ssh Brute Force Attackmentioning
confidence: 99%