D. Naylor, A. Finamore, I. Leontiadis, Y. Grunenberger, M. Mellia et al., The Cost of the "S" in HTTPS, Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, CoNEXT '14, pp.133-140, 2014.
DOI : 10.1145/2674005.2674991

D. Kolton, A. Stav, A. Wexler, A. E. Frydman, and Y. Zahavi, System to enable detecting attacks within encrypted traffic, p.652, 2011.

W. M. Shbair, T. Cholez, A. Goichot, and I. Chrisment, Efficiently bypassing SNI-based HTTPS filtering, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.990-995, 2015.
DOI : 10.1109/INM.2015.7140423

URL : https://hal.archives-ouvertes.fr/hal-01202712

L. Bernaille and R. Teixeira, Early Recognition of Encrypted Applications, Passive and Active Network Measurement, pp.165-175, 2007.
DOI : 10.1007/978-3-540-71617-4_17

URL : https://hal.archives-ouvertes.fr/hal-01097556

R. Alshammari, Machine learning based encrypted traffic classification: Identifying SSH and Skype, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1-8, 2009.
DOI : 10.1109/CISDA.2009.5356534

D. Schatzmann, W. Mühlbauer, T. Spyropoulos, and X. Dimitropoulos, Digging into HTTPS, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.322-327, 2010.
DOI : 10.1145/1879141.1879184

M. Liberatore and B. N. Levine, Inferring the source of encrypted HTTP connections, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.255-263, 2006.
DOI : 10.1145/1180405.1180437

D. Herrmann, R. Wendolsky, and H. Federrath, Website fingerprinting, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.31-42, 2009.
DOI : 10.1145/1655008.1655013

A. Panchenko, L. Niessen, A. Zinnen, and T. Engel, Website fingerprinting in onion routing based anonymization networks, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, pp.103-114, 2011.
DOI : 10.1145/2046556.2046570

B. Miller, L. Huang, A. D. Joseph, and J. D. Tygar, I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis, Privacy Enhancing Technologies, pp.143-163, 2014.
DOI : 10.1007/978-3-319-08506-7_8

T. Dierks, The transport layer security (TLS) protocol version 1.2 (RFC 5246), 2008.

D. Eastlake, Transport layer security (TLS) extensions: Extension definitions (RFC 6066), 2011.

L. Völker, M. Noe, O. P. Waldhorst, C. Werle, C. Sorge-cao et al., Can internet users protect themselves? challenges and techniques of automated protection of HTTP communication Progress in study of encrypted traffic classification, Trustworthy Computing and Services, pp.457-467, 2011.

W. De-donato, A. Pescape, and A. Dainotti, Traffic identification engine: an open platform for traffic classification, Network, IEEE, vol.28, issue.2, pp.56-64, 2014.

C. Bacquet and M. Heywood, Genetic optimization and hierarchical clustering applied to encrypted traffic identification, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.194-201, 2011.
DOI : 10.1109/CICYBS.2011.5949391

S. Valenti, D. Rossi, A. Dainotti, A. Pescapè, A. Finamore et al., Reviewing traffic classification, " in Data Traffic Monitoring and Analysis, pp.123-147, 2013.

T. T. Nguyen and G. Armitage, A survey of techniques for internet traffic classification using machine learning, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.56-76, 2008.
DOI : 10.1109/SURV.2008.080406

C. Mccarthy, An investigation on identifying SSL traffic, 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp.115-122, 2011.
DOI : 10.1109/CISDA.2011.5945943

P. Velan, M. Cermák, P. Celeda, and M. Dra?ar, A survey of methods for encrypted traffic classification and analysis, International Journal of Network Management, vol.21, issue.4, pp.355-374, 2015.
DOI : 10.1002/nem.1901

H. Cheng and R. Avnur, Traffic analysis of SSL encrypted web browsing, 1998.

S. Kim, Y. Goo, M. Kim, S. Choi, and M. Choi, A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.487-490, 2015.
DOI : 10.1109/APNOMS.2015.7275373

K. Marsolo, S. Parthasarathy, and C. Ding, A Multi-Level Approach to SCOP Fold Recognition, Fifth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'05), pp.57-64, 2005.
DOI : 10.1109/BIBE.2005.5

Y. Okada, S. Ata, N. Nakamura, Y. Nakahira, and I. Oka, Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic, 2011 10th International Conference on Machine Learning and Applications and Workshops, pp.358-361, 2011.
DOI : 10.1109/ICMLA.2011.162

Y. Kumano, S. Ata, N. Nakamura, Y. Nakahira, and I. Oka, Towards real-time processing for application identification of encrypted traffic, 2014 International Conference on Computing, Networking and Communications (ICNC), pp.136-140, 2014.
DOI : 10.1109/ICCNC.2014.6785319

F. Dehghani, N. Movahhedinia, M. R. Khayyambashi, and S. Kianian, Real-Time Traffic Classification Based on Statistical and Payload Content Features, 2010 2nd International Workshop on Intelligent Systems and Applications, pp.1-4, 2010.
DOI : 10.1109/IWISA.2010.5473467

H. Kim, K. C. Claffy, M. Fomenkov, D. Barman, M. Faloutsos et al., Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, p.11, 2008.
DOI : 10.1145/1544012.1544023

R. Alshammari and A. N. Zincir-heywood, Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?, Computer Networks, vol.55, issue.6, pp.1326-1350, 2011.
DOI : 10.1016/j.comnet.2010.12.002

J. Zhang and M. Zulkernine, Network intrusion detection using random forests, Third Annual Conference on Privacy, Security and Trust, Proceedings, 2005.

S. Marchal, J. François, R. State, and T. Engel, PhishScore: Hacking phishers' minds, 10th International Conference on Network and Service Management (CNSM) and Workshop, pp.46-54, 2014.
DOI : 10.1109/CNSM.2014.7014140

URL : https://hal.archives-ouvertes.fr/hal-01094238