Unveiling encrypted traffic types through hierarchical network characteristics.
Yufan ChenJiahai YangSusu CuiCong DongBo JiangYuling LiuZhigang LuPublished in: Comput. Secur. (2024)
Keyphrases
- network traffic
- traffic patterns
- traffic analysis
- origin destination
- telecommunication networks
- network resources
- internet traffic
- traffic volume
- traffic flow
- peer to peer
- traffic data
- traffic load
- complex networks
- internet service providers
- network conditions
- network traffic monitoring
- network monitoring
- transportation networks
- resource utilization
- ddos attacks
- network architecture
- network model
- community structure
- traffic flows
- network structure
- traffic network
- hierarchical structure
- network management
- travel time
- traffic engineering
- ip addresses
- intermediate nodes
- network configuration
- computer networks