• Study On Optical Communications
  • Vol. 47, Issue 1, 1 (2021)
LU Yu-bin, XUAN Han, WANG Yan-hao, XU Kai..., ZHU Jia-hao and SHEN Jian-hua*|Show fewer author(s)
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.13756/j.gtxyj.2021.01.001 Cite this Article
    LU Yu-bin, XUAN Han, WANG Yan-hao, XU Kai, ZHU Jia-hao, SHEN Jian-hua. A Residual Network based Improved Network Traffic Classification Algorithm[J]. Study On Optical Communications, 2021, 47(1): 1 Copy Citation Text show less
    References

    [1] Cotton M, Eggert L, Touch J, et al. Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Transport Protocol Port Number and Service Name Registry[J]. American Journal of Tropical Medicine & Hygiene, 2011, 85(5):957-960.

    [2] Sherry J, Lan C, Popa R A, et al. BlindBox: Deep Packet Inspection over Encrypted Traffic[J]. Acm Sigcomm Computer Communication Review, 2015, 45(4):213-226.

    [3] Finsterbusch M, Richter C, Rocha E, et al. A Survey of Payload-Based Traffic Classification Approaches[J]. IEEE Communications Surveys & Tutorials, 2014, 16(2):1135-1156.

    [4] He H. A Network Traffic Classification Method Using Support Vector Machine with Feature Weighted-Degree[J]. Journal of Digital Information Management, 2017, 15(2):76-83.

    [5] Nguyen T T T, Armitage G J. A Survey of Techniques for Internet Traffic Classification Using Machine Learning[J]. IEEE Communications Surveys & Tutorials, 2008, 10(3):56-76.

    [6] Park B,Hong W K,Won Y J.Toward Fine-Grained Traffic Classification[J].IEEE Communications Magazine,2011,49(7):104-111.

    [7] Lecun Y,Bengio Y,Hinton G.Deep Learning[J].Nature,2015,521(7553):436-444.

    [8] Kabanga E K,Kim C H.Malware Images Classification Using Convolutional Neural Network[J].Journal of Computer & Communications,2018,6(1):153-158.

    [9] He K, Zhang X, Ren S, et al. Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2014, 37(9):1904-1916.

    [10] Wang W,Zhu M,Wang J,et al.End-to-End Encrypted Traffic Classification with One-Dimensional Convolution Neural Networks[C]//IEEE International Conference on Intelligence and Security Informatics. Beijing, China:IEEE, 2017:43-48.

    [11] Lotfollahi M,Zade R S H,Siavoshani M J,et al.Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning[J]. Soft Computing, 2020, 24(3):1999-2012.

    [12] Bengio Y,Simard P,Frasconi P.Learning Long-Term Dependencies with Gradient Descent is Difficult[J]. IEEE Transactions on Neural Networks, 1994, 5(2):157-166.

    [13] He K,Zhang X,Ren S,et al.Deep Residual Learning for Image Recognition[C]//IEEE Conference on Computer Vision & Pattern Recognition. Las Vegas, NV, USA:IEEE, 2016:770-778.

    [14] Lecun Y, Bottou L. Gradient-Based Learning Applied to Document Recognition[J]. Proceedings of the IEEE, 1998, 86(11):2278-2324.

    [15] Dainotti A, Pescape A, Claffy K C. Issues and Future Directions in Traffic Classification[J]. IEEE Network, 2012, 26(1):35-40.

    LU Yu-bin, XUAN Han, WANG Yan-hao, XU Kai, ZHU Jia-hao, SHEN Jian-hua. A Residual Network based Improved Network Traffic Classification Algorithm[J]. Study On Optical Communications, 2021, 47(1): 1
    Download Citation