作者: Luoshi Zhang , Yibo Xue , Dawei Wang
DOI: 10.14257/IJFGCN.2015.8.2.16
关键词: False positives and false negatives 、 Computer science 、 Protocol (science) 、 Variety (cybernetics) 、 Identification methods 、 Identification (information) 、 Data mining 、 Research studies 、 Encryption 、 Scale (chemistry)
摘要: Due to the wide use of encrypted protocols and random ports, traditional methods that based on port number or packet payload have gradually lose their effectiveness. To address this …