{"id":"https://openalex.org/W2091010933","doi":"https://doi.org/10.1109/comsnets.2015.7098675","title":"Detecting tunneled video streams using traffic analysis","display_name":"Detecting tunneled video streams using traffic analysis","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2091010933","doi":"https://doi.org/10.1109/comsnets.2015.7098675","mag":"2091010933"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2015.7098675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2015.7098675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089007798","display_name":"Yan Shi","orcid":"https://orcid.org/0000-0002-7844-6227"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yan Shi","raw_affiliation_strings":["Electrical and Computer Engineering, Michigan State University, East Lansing, MI","Electrical and Computer Engineering, Michigan State University,East Lansing,USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Michigan State University, East Lansing, MI","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Electrical and Computer Engineering, Michigan State University,East Lansing,USA","institution_ids":["https://openalex.org/I87216513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107170592","display_name":"Subir Biswas","orcid":"https://orcid.org/0000-0003-0828-2500"},"institutions":[{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Subir Biswas","raw_affiliation_strings":["Electrical and Computer Engineering, Michigan State University, East Lansing, MI","Electrical and Computer Engineering, Michigan State University,East Lansing,USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Michigan State University, East Lansing, MI","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"Electrical and Computer Engineering, Michigan State University,East Lansing,USA","institution_ids":["https://openalex.org/I87216513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089007798"],"corresponding_institution_ids":["https://openalex.org/I87216513"],"apc_list":null,"apc_paid":null,"fwci":1.7258,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.88337858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2009","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7943357229232788},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5664317011833191},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.5224398970603943},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5202542543411255},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.5084366202354431},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.4988529682159424},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49764373898506165},{"id":"https://openalex.org/keywords/video-streaming","display_name":"Video streaming","score":0.44837531447410583},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.41546154022216797},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.22340533137321472},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.19203665852546692},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17735692858695984},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1343356966972351}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7943357229232788},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5664317011833191},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.5224398970603943},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5202542543411255},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.5084366202354431},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.4988529682159424},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49764373898506165},{"id":"https://openalex.org/C2986160907","wikidata":"https://www.wikidata.org/wiki/Q220499","display_name":"Video streaming","level":2,"score":0.44837531447410583},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.41546154022216797},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.22340533137321472},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.19203665852546692},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17735692858695984},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1343356966972351},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2015.7098675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2015.7098675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W105475431","https://openalex.org/W1984097153","https://openalex.org/W2008063947","https://openalex.org/W2021949962","https://openalex.org/W2022895127","https://openalex.org/W2027302330","https://openalex.org/W2099040451","https://openalex.org/W2108217512","https://openalex.org/W2135579486","https://openalex.org/W2167266744","https://openalex.org/W2174056151","https://openalex.org/W2266218113","https://openalex.org/W4210531213"],"related_works":["https://openalex.org/W2225089553","https://openalex.org/W2026621111","https://openalex.org/W3171671300","https://openalex.org/W4293088549","https://openalex.org/W2964663688","https://openalex.org/W3007491104","https://openalex.org/W2187040164","https://openalex.org/W3130174800","https://openalex.org/W4285292284","https://openalex.org/W1522239898"],"abstract_inverted_index":{"Detecting":[0],"access":[1,98],"to":[2,13,17,38,91,99],"video":[3,70,84,100,172],"streaming":[4,85,101,173],"websites":[5],"is":[6],"the":[7,74,78,93,127,164],"first":[8],"step":[9],"for":[10,81],"an":[11,57,147],"organization":[12],"regulate":[14],"unwanted":[15],"accesses":[16],"such":[18,40,53],"sites":[19,102],"by":[20],"its":[21],"employees.":[22],"Adversaries":[23],"often":[24],"adopt":[25],"circumvention":[26],"techniques":[27],"using":[28,60],"proxy":[29],"servers":[30],"and":[31,66],"Virtual":[32],"Private":[33],"Networks":[34],"(VPNs)":[35],"in":[36,63,68,130],"order":[37],"avoid":[39],"detection.":[41],"This":[42],"paper":[43],"presents":[44],"a":[45,104,110,118],"traffic":[46,55,64,79,114,136,145,167],"analysis":[47,168],"based":[48,169],"technique":[49],"that":[50,126],"can":[51],"detect":[52],"tunneled":[54],"at":[56],"organization's":[58],"firewall":[59],"signatures":[61],"found":[62],"amount":[65],"timing":[67],"targeted":[69],"traffic.":[71],"We":[72],"present":[73],"detection":[75,94,170],"results":[76,88,124,162],"on":[77],"data":[80,115],"several":[82],"popular":[83],"sites.":[86,174],"Additional":[87],"are":[89],"presented":[90],"validate":[92,163],"framework":[95],"when":[96],"detecting":[97],"from":[103,117,146],"wide":[105],"range":[106],"of":[107,121,166,171],"clients":[108],"with":[109,113,137,150],"classifier":[111,128],"trained":[112],"collected":[116],"limited":[119],"number":[120],"clients.":[122],"The":[123,161],"show":[125],"works":[129],"both":[131],"cases.":[132],"It":[133],"detects":[134,144],"same-client":[135],"high":[138],"true":[139,152],"positive":[140,153,159],"rate,":[141],"while":[142],"it":[143],"unknown":[148],"client":[149],"lower":[151],"rate":[154],"but":[155],"very":[156],"low":[157],"false":[158],"rate.":[160],"effectiveness":[165]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
