{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:09:56Z","timestamp":1726409396497},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319042824"},{"type":"electronic","value":"9783319042831"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-04283-1_15","type":"book-chapter","created":{"date-parts":[[2013,12,16]],"date-time":"2013-12-16T21:28:18Z","timestamp":1387229298000},"page":"234-251","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Web Tunnel Detection Method Based on Protocol Behaviors"],"prefix":"10.1007","author":[{"given":"Fei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Borders, K., Prakash, A.: Web Tap: Detecting Covert Web Traffic. In: Proceedings of the 11th ACM Conference on Computer and Communication Security, pp. 110\u2013120 (October 2004)","DOI":"10.1145\/1030083.1030100"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11767831_1","volume-title":"Privacy Enhancing Technologies","author":"G.D. Bissias","year":"2006","unstructured":"Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy Vulnerabilities in Encrypted HTTP Streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 1\u201311. Springer, Heidelberg (2006)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, pp. 255\u2013263 (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"15_CR4","unstructured":"Hern\u00e1ndez-Campos, F., Smith, F.D., Jeffay, K., Nobel, A.B.: Statistical Clustering of Internet Communications Patterns. Computing Science and Statistics\u00a035 (2003)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering Using Machine Learning Techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: SIGMETRICS 2005: Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Banff, Alberta, Canada, pp. 50\u201360 (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"15_CR7","first-page":"2745","volume":"7","author":"C.V. Wright","year":"2006","unstructured":"Wright, C.V., Monrose, F., Masson, G.M.: On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research\u00a07, 2745\u20132769 (2006)","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.comnet.2008.09.010","volume":"53","author":"M. Dusi","year":"2009","unstructured":"Dusi, M., Crotti, M., Gringoli, F., Salgarelli, L.: Detecting Application-Layer Tunnels with Statistical Fingerprinting. Journal of Computer Networks\u00a053(1), 81\u201397 (2009)","journal-title":"Journal of Computer Networks"},{"key":"15_CR9","unstructured":"Wiki: Kernel Density Estimation (2013), http:\/\/en.wikipedia.org\/wiki\/Kernel_density_estimation"},{"key":"15_CR10","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2013), http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Chen, S., Goodman, J.: An empirical study of smoothing techniques for language modeling. In: Proceedings of the 34th Annual Meeting on Association for Computational Linguistics (ACL 1996), NJ, USA, pp. 310\u2013318 (June 1996)","DOI":"10.3115\/981863.981904"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-88961-8_16","volume-title":"Information Hiding","author":"Z. Chen","year":"2008","unstructured":"Chen, Z., Huang, L., Yu, Z., Yang, W., Li, L., Zheng, X., Zhao, X.: Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol.\u00a05284, pp. 224\u2013235. Springer, Heidelberg (2008)"},{"key":"15_CR13","unstructured":"HTTPTunnel v1.2.1 (2013), http:\/\/sourceforge.net\/projects\/http-tunnel\/files\/http-tunnel\/HTTPTunnel%20v1.2.1"},{"key":"15_CR14","unstructured":"Barracuda HTTPS Tunnel (2013), http:\/\/barracudadrive.com\/HttpsTunnel.lsp"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04283-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:21:16Z","timestamp":1498090876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04283-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319042824","9783319042831"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04283-1_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}