JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2026, Vol. 61 ›› Issue (3): 1-10.doi: 10.6040/j.issn.1671-9352.9.2025.002
CLC Number:
| [1] 侯剑,鲁辉,刘方爱,等. 加密恶意流量检测及对抗综述[J]. 软件学报,2024,35(1):333-355. HOU Jian, LU Hui, LIU Fangai, et al. A review of encrypted malicious traffic detection and countermeasure[J]. Journal of Software, 2024, 35(1):333-355. [2] 陈子涵,程光,徐子恒,等. 互联网加密流量检测、分类与识别研究综述[J]. 计算机学报,2023,46(5):1060-1085. CHEN CHENG Zihan, XU Guang, XU Ziheng, et al. A review of research on detection, classification and recognition of encrypted traffic on the internet[J]. Journal of Computing, 2023, 46(5):1060-1085. [3] LONG G, ZHANG Z X. Deep encrypted traffic detection: an anomaly detection framework for encryption traffic based on parallel automatic feature extraction[J]. Computational Intelligence and Neuroscience, 2023, 2023:3316642. [4] LOTFOLLAHI M, JAFARI S M, SHIRALI H Z R, et al. Deep packet: a novel approach for encrypted traffic classification using deep learning[J]. Soft Computing, 2020, 24(3):1999-2012. [5] AGRAWAL S, SOHI B S. Feature optimization and performance evaluation of machine learning algorithms for identification of P2P traffic[J]. Journal of Advances in Information Technology, 2012, 3(2):107-114. [6] WANG Z H, THING V L L. Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms[J]. Computers & Security, 2023, 128:103143. [7] ZHAO J J, LI Q, HONG Y P, et al. MetaRockETC: adaptive encrypted traffic classification in complex network environments via time series analysis and meta-learning[J]. IEEE Transactions on Network and Service Management, 2024, 21(2):2460-2476. [8] CHEN C, QU L F, AMIRPOUR H, et al. On the security of selectively encrypted HEVC video bitstreams[J]. ACM Transactions on Multimedia Computing, Communications, and Applications, 2024, 20(9):1-27. [9] WANG Z H, WANG J R, LIU Y, et al. Privacy-preserving attribute-based access control scheme with intrusion detection and policy hiding for data sharing in VANET[J]. IEEE Internet of Things Journal, 2024, 11(13):23348-23369. [10] 谷勇浩,徐昊,张晓青. 基于多粒度表征学习的加密恶意流量检测[J]. 计算机学报,2023,46(9):1888-1899. GU Yonghao, XU Hao, ZHANG Xiaoqing. Encrypted malicious traffic detection based on multi-granularity representation learning[J]. Journal of Computing, 2023, 46(9):1888-1899. [11] XU S J, GENG G G, JIN X B, et al. Seeing traffic paths: encrypted traffic classification with path signature features[J]. IEEE Transactions on Information Forensics and Security, 2022, 17:2166-2181. [12] CHEVYREV I, KORMILITZIN A. A primer on the signature method in machine learning[EB/OL]. https://arxiv.org/abs/1603.03788 [13] WANG Y, ZHANG L, CHEN H. High-frequency trading anomaly detection via signature-transformer[J]. IEEE Transactions on Financial Informatics, 2023, 19(4):1234-1245. [14] LI H, WANG Q, LIU Z. Reinforcement learning optimized path signatures for motion rehabilitation assessment[J]. ACM Transactions on Health Informatics, 2023, 10(3):1-18. [15] GUO S, ZHOU T, LI H. Dynamic gene regulatory network modeling via path signature-GNN[J]. Bioinformatics, 2024, 40(1):1-10. [16] ZHAO Z M, LI Z X, JIANG J L, et al. ERNN: error-resilient RNN for encrypted traffic detection towards network-induced phenomena[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 99:1-18. [17] WANG Q L, WU B G, ZHU P F, et al. ECA-net: efficient channel attention for deep convolutional neural networks[C] //2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR). Seattle: IEEE, 2020:11534-11542. [18] 麻文刚,张亚东,郭进. 基于LSTM与改进残差网络优化的异常流量检测方法[J]. 通信学报,2021,42(5):23-40. MA Wengang, ZHANG Yadong, GUO Jin. Anomalous traffic detection method based on LSTM with improved residual network optimization[J]. Journal of Communications, 2021, 42(5):23-40. [19] ZHANG S H, MA L F, LIU H J. Encryption-decryption-based event-triggered consensus control for nonlinear MASs under DoS attacks[J]. International Journal of Robust and Nonlinear Control, 2024, 34(1):132-146. [20] WANG M N, ZHENG K F, LUO D, et al. An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders[C] //2020 IEEE 6th International Conference on Computer and Communications(ICCC).Chengdu: IEEE, 2020:634-641. [21] WANG Z H, THING V L L. Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms[J]. Computers & Security, 2023, 128:103143. [22] CUI S S, JIANG B, CAI Z Z, et al. A session-packets-based encrypted traffic classification using capsule neural networks[C] //2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems(HPCC/SmartCity/DSS). Zhangjiajie: IEEE, 2019. |
| [1] | Feixu LI,Fei YAN,Binlin CHENG,Liqiang ZHANG. An automatic protocol vulnerability detection framework for resource-constrained devices of LPWAN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2023, 58(9): 39-50. |
| [2] | Bo ZHAO,Jing QIN,Jinlu LIU. An encryption scheme supporting wildcard and fuzzy search [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2023, 58(9): 28-38. |
| [3] | Jiao LYU,Xi ZHANG,Jing QIN. Time-controlled designated tester proxy re-encryption with keyword search scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2023, 58(9): 16-27. |
| [4] | Xiuzhen CHENG,Weifeng LYU,Minghui XU,Runyu PAN,Dongxiao YU,Chenxu WANG,Yong YU,Xue XIAO. Meta computing: a new computing paradigm under zero trust [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2023, 58(9): 1-15. |
| [5] | Zhao-xia WU,Yi WANG. A safe auction algorithm for heterogeneous spectrum based on Paillier homomorphism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2021, 56(3): 23-27. |
| [6] | Chao ZHANG,Ying LIANG,Hao-shan FANG. Social network information recommendation method of supporting privacy protection [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2020, 55(3): 9-18. |
| [7] | Ying LI,Jun HU. Hierarchical trusted cryptography service framework based on distributed message drive [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2020, 55(3): 19-27. |
| [8] | Jun HU,Zi-peng DIAO. vTCM: a virtualized trusted cryptography module based on the virtualization of physical trusted computing environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(7): 77-88. |
| [9] | Juan QU,Yu-ming FENG,Yan-ping LI,Li LI. An anonymous and provably remote user authentication protocol using extended chaotic maps for multi-server system [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(5): 44-51. |
| [10] | Jia XU,Peng JIANG. A survey of visual saliency and salient object detection methods [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 28-37. |
| [11] | Fu-sheng WU,Huan-guo ZHANG,Ming-tao NI,Jun WANG. Security analysis model of behavior based on cryptographic protocols implement at source code level [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 18-27. |
| [12] | Xiao-jie XIE,Ying LIANG,Xiang-xiang DONG. Sensitive attribute iterative inference method for social network users [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 10-17, 27. |
| [13] | Tian-tian CHANG,Xing-shu CHEN,Yong-gang LUO,Xiao LAN. Security domain-based data isolation protection framework for Hive [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(3): 1-9. |
| [14] | Ze-nan WU,Li-qin TIAN,Zhi-gang WANG. A user behavior trust evaluation combined with sliding window and recommended trust [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 53-59. |
| [15] | Yao-yao DU,Ping PAN,Jin-hua LINGHU. Evaluation method of information system grade protection based on DIT [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 47-52. |
|
||