VoIP Traffic Detection in Tunnelled and Anonymous Networks Using Deep Learning
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services to hide the true nature of the network communication.
Network management is facing a great challenge to analyze and identify encrypted network traffic with specific applications and protocols. A significant number of network users applying different encryption techniques to network applications and services to hide the true nature of the network communication.
true nature, Services, different encryption techniques, specific applications, significant number of network users, encrypted network traffic, Network management, network communication, network applications